Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Operation method, device and server of modular exponentiation in public key cryptosystem

A technology of public key cryptosystem and operation method, which is applied in the field of equipment and servers, and the field of modular exponentiation method in public key cryptosystem, which can solve the problems that the privacy of cryptographic operations cannot be guaranteed.

Active Publication Date: 2013-05-08
GUANGDONG CERTIFICATE AUTHORITY
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Based on this, it is necessary to provide a method, device and server for modular exponentiation in the public key cryptosystem in view of the technical problem that outsourcing cryptographic operations to cloud computing systems cannot guarantee the privacy of cryptographic operations in the existing technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation method, device and server of modular exponentiation in public key cryptosystem
  • Operation method, device and server of modular exponentiation in public key cryptosystem
  • Operation method, device and server of modular exponentiation in public key cryptosystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0093] Such as figure 1 Shown is a working flow chart of the modular exponentiation method in a public key cryptosystem of the present invention.

[0094] Step S101, constructing a random parameter w;

[0095] Step S102, selecting a random number k;

[0096] Step S103, performing a linear operation on w and k to obtain k'=Γ(k,w);

[0097] Step S104, send calculation g to the server k ′, where g is the generator in the public key cryptosystem, that is, the multiplicative group Z * p Elements of intermediate order q;

[0098] Step S105, obtain server calculation g k 'The calculation result Q';

[0099] Step S106, get Q w , the Q w =g w ;

[0100] Step S107, Q' and Q w Corresponding multiplication is performed according to the inverse operation of the linear operation to obtain Q, which is the result of the modular exponenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cryptology, in particular to an operation method, a device and a server of modular exponentiation in a public key cryptosystem. The method of the modular exponentiation includes the steps: constructing a stray parameter w, selecting a random number k, carrying out linear operation on w and k to get k', sending a request of calculating g*k' to the server and the g being a generating element in the public key cryptosystem, getting calculation result Q' of the g*k, acquiring Qw and the Qw is equal to g*w, and carrying out corresponding multiplication on the Q' and the Qw according to inverse operation of linear operation to get Q. According to the operation method, the device and the server of the modular exponentiation in the public key cryptosystem, under the condition that safety of digital signatures is satisfied, the modular exponentiation in the public key cryptosystem is safely consigned to a cloud computing service provider in a computing outsourcing mode, a cloud computing system is used for completing operation with high computing intensity, so that a digital signature system is capable of satisfying the demands of large scale and high concurrency and is provided with a character of dynamic propagation.

Description

technical field [0001] The invention relates to the technical field of cryptography, in particular to a modular exponentiation method, device and server in a public key cryptosystem. Background technique [0002] Digital signatures have important applications in information security, including identity authentication, data integrity, non-repudiation, and anonymity, especially in key distribution, authentication, and e-commerce systems in large-scale network security communications. Digital signature is an important tool for authentication and has many practical uses. It can indicate the identity of the user in the communication protocol, and can also be used in the X.509 digital certificate to verify that the certificate is issued by a specific digital certification authority (CA). . [0003] The general process of using a digital signature includes the following steps: (1) The sender first transforms the message with a public one-way function to obtain a digital signature,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
Inventor 刘镪张永强梁文晖
Owner GUANGDONG CERTIFICATE AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products