Elliptical curve-based method and elliptical curve-based device for self-authenticating signature

A technology of elliptic curve and verification method, which is applied in the field of cryptography and can solve problems such as key escrow

Inactive Publication Date: 2009-09-30
张键红
View PDF1 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, there is a fatal problem in this system: the key escrow problem
However, an elliptic curve-based method capable of doing self-authenticating signatures both on / off-line does not appear

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Elliptical curve-based method and elliptical curve-based device for self-authenticating signature
  • Elliptical curve-based method and elliptical curve-based device for self-authenticating signature
  • Elliptical curve-based method and elliptical curve-based device for self-authenticating signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The self-authentication signature method based on elliptic curve proposed by the present invention can provide a safe, fast, concise and effective signature method, and prevent the extension of signature rights by setting the signature key of the signature entity. The self-authentication signature method based on elliptic curves proposed by the present invention can be extended to satisfy one-to-many aggregate signatures according to different signature entities and signature messages, that is, one signature entity performs self-authentication signatures on different messages, and then, these A method of message signature aggregation into one signature; in order to improve the speed of online signature, a method of on / offline self-authenticated message signature is given.

[0058] The self-authentication signature method based on the elliptic curve of the present invention needs a certification authority CA in the generation of the user's partial private key. During the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an elliptical curve-based method for self-authenticating signature, an extended signature method thereof, and a signature verification process. An authentication authorized organization generates part of signature private keys of a signature entity; and the signature entity uses part of self-selected private keys as well as received private keys from the authentication authorized organization to generate a signature private key. With an elliptical curve, the calculation efficiency is improved. And the invention provides an elliptical curve-based method for one-to-one self-authenticating signature, a method for self-authenticating aggregate signature and a method for generating a self-authenticating signature off line. The security of the methods is based on an SDH+CDH assumption put forward. The plurality of methods provided can meet the security requirement of signature protocols, improve signature efficiency to some extent and meet requirements of some special conditions.

Description

technical field [0001] The present invention relates to digital signature technology and self-certification technology in the field of cryptography. By combining elliptic curve cryptography technology, and using computers and other types of communication equipment, the design of self-certification signature system can be realized through the network or other ways, so that it can be used as a structural security, Modules for fair e-commerce, e-government, etc. Background technique [0002] The private key in the digital signature scheme is usually selected by the entity itself and kept secret. The corresponding public key generated needs to be certified by a certificate issued by an authentication authority. During the signing process, the signing entity can use its private key to sign any message. When a verifier verifies the validity of a signature, it first verifies the validity of the signer’s public key certificate, and then uses the signer’s public key to verify Validi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 张键红
Owner 张键红
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products