Digital signature method based on super logarithm difficult problem, and dual coresidual theorem

A digital signature and super-logarithmic technology, applied in data processing applications, user identity/authority verification, business, etc., can solve problems such as weakening security strength

Inactive Publication Date: 2007-05-09
苏盛辉
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as computing speeds increase,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature method based on super logarithm difficult problem, and dual coresidual theorem
  • Digital signature method based on super logarithm difficult problem, and dual coresidual theorem
  • Digital signature method based on super logarithm difficult problem, and dual coresidual theorem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] The characteristic of the public-key digital signature method based on the super-logarithm problem and the double congruence theorem is that it allows each user to obtain two keys, one key can be made public, and one key can only be privately owned. In this way, there is no need to worry about the secret key being leaked during the transfer process. When the correspondent is agreed to transmit information on the Internet, the sender uses his own private key to digitally sign the file or message, and the receiver uses the sender's public key to verify it after receiving the file and signature code.

[0085] Each user can obtain two keys from the designated CA (Certificate Authentication) certification center. CA certification center is an institution that registers users and generates, distributes and manages keys. It uses the key generation method in Section 3.2.2 to generate the user's public key and private key.

[0086] This digital signature method can be realized...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method utilizes the level function, super logarithm aporia, twin coresidual theorem to design a public secret key digital signature method. The method consists of key generation, digit signature and ID verification. The user holds two keys, i.e. a private key and a public key. There is no way to derive the private key from the public key. The private key is used to generate the signature code of the document or the message. The public key is used to verify the signature code of the document or the message. This method can prevent attack from existed analysis means effectively. The method can be used for any signature and verification of document and data in computer and comm. network and for ID appraisal or content validation in the electronic government affairs and the electronic business.

Description

(1) Technical field [0001] Public key digital signature method (referred to as public key digital signature method or signature method) belongs to the field of cryptography and computer technology, and is one of the core technologies of information security. (2) Background technology [0002] The development of cryptography has gone through three stages: classical cryptography, symmetric cryptography and public key cryptography. In 1976, American scholars Diffie and Hellman proposed the idea of ​​public key cryptography, marking the advent of public key cryptography. At present, the commonly used digital signature technologies include RSA scheme, Rabin scheme and ElGamal scheme (see "Applied Cryptography", written by Bruce Schneier in the United States, translated by Wu Shizhong, Zhu Shixiong, etc., Mechanical Industry Press, January 2000, No. 334-342 Page). In order to improve security, the ElGamal scheme is often implemented on the elliptic c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06Q30/00G06Q40/00
Inventor 苏盛辉
Owner 苏盛辉
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products