Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Anti-Intrusion Identity-Based Signature Method

A technology of identity signature and identity, which is applied in the field of information security and can solve problems such as the inability to forge user signatures

Active Publication Date: 2017-02-08
SHANDONG ZHENGZHONG COMP NETWORK TECH CONSULTING
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Also, even if an intruder hacks both the base and the user's device at the same time, he cannot forge the user's signature for all time periods before that

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Anti-Intrusion Identity-Based Signature Method
  • An Anti-Intrusion Identity-Based Signature Method
  • An Anti-Intrusion Identity-Based Signature Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] The following examples are used to describe the implementation of the present invention in detail, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention.

[0084] figure 1 It is a working diagram of the anti-intrusion identity-based signature method provided by the embodiment of the present invention, wherein the system building module generates the public parameters and master key required by the invention according to the input security parameters and the total number of time periods; private key extraction The module generates the initial base key and the initial user key according to the public parameters, the master key and the identity of a user; the base key and user key update module generates j+ The new key of 1 time period; The base key and the user key refresh module, according to the base and user key of the r sub-time period during the j tim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an invasion-resistant identity-based signature method, which comprises a first step of establishing a system, a second step of extracting a private key, a third step of updating a base key, a fourth step of updating a user key, a fifth step of refreshing the base key, a sixth step of refreshing the user key, a seventh step of signing and an eighth step of verifying. According to the method, different keys are used by a base and a user at different time buckets, even at the same time bucket, the keys of the base and the user are refreshed for many times. As long as an invader does not simultaneously obtain the user key and the base key at the same sub-time bucket of the same time bucket, the user key at the other time bucket cannot be figured up, and a signature of the user cannot be counterfeited. In addition, even the invader synchronously invades the base and user equipment, the invader cannot counterfeit the signatures of the user at all time buckets before. The capacity of preventing the key from revealing of the system is greatly enhanced, and the invasion-resistant identity-based signature method has very high security.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an anti-intrusion identity-based signature method. Background technique [0002] The key leakage problem seriously affects the security of digital signatures. Once the key is leaked, all signatures formed by this key will no longer be trusted. In modern society, more and more signature algorithms are applied to portable and low-security mobile devices, which makes key leakage inevitable. It is easier for an attacker to break into a poorly secured mobile device than to break actual password assumptions. [0003] In identity-based signatures, the identity of the signer is his public key, and the verifier can verify the signature through the identity of the signer. The identity-based signature system simplifies the management system of the public key infrastructure PKI. In the identity-based signature scheme, once the key is leaked, the user's identity and correspond...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 于佳郝蓉
Owner SHANDONG ZHENGZHONG COMP NETWORK TECH CONSULTING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products