Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Certificateless signature method based on Schnorr signature algorithm

A certificate-free, signature verification technology, applied in the field of network security, can solve the problems of ignoring public key replacement attacks, few system parameters, and more bilinear equivalence, achieving high trust level, reducing the number of uses, and low honesty.

Active Publication Date: 2015-01-28
XIDIAN UNIV
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] First, although compared with the previous method, this method has fewer system parameters and higher computational efficiency, but it still uses more bilinear pairings, which is difficult to implement in an environment with limited communication bandwidth;
[0005] Second, although this method takes into account the attack of Xia et al. (Key replacement attack on two certificateless signature schemes without random oracles. Key Engineering Materials, 2010,439:1606-1611), it ignores the public key replacement attack and dishonesty KGC is passive and therefore vulnerable to both types of attacks;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless signature method based on Schnorr signature algorithm
  • Certificateless signature method based on Schnorr signature algorithm
  • Certificateless signature method based on Schnorr signature algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings.

[0026] refer to figure 1 , the implementation steps of the present invention are as follows:

[0027] Step 1, the key generation center KGC generates system parameters.

[0028] (1a) Set the security parameter l of the certificateless signature system according to actual requirements;

[0029] (1b) The key generation center KGC selects a large prime number p according to the set system security parameter l, where p>2 l , to construct an additive cyclic group G of order p 1 and p factorial cyclic group G 2 , so that it satisfies the bilinear map e:G 1 ×G 1 →G 2 , that is, from the additive cyclic group G 1 Take any two elements in arbitrarily as the input of the bilinear map e, then its output must be the multiplicative cyclic group G 2 an element in

[0030] (1c) The key generation center KGC selects a function f(Q): if the input Q is an odd number, then outp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a certificateless signature method based on the Schnorr signature algorithm. The certificateless signature method mainly solves the problems that the safety is poor and the efficiency is low in the prior art. The certificateless signature method is implemented through the following steps that (1) a public key pkID and secret information skID are generated through a signer; (2) a partial secret information pskID of the signer is generated through a key generation center KGC, and is sent to the signer through a safe channel; (3) the signer signs a message m, and a signature delta is generated; (4) the signature verifier checks the validity of the signature delta, the signature of the message m by the signer is legal if the signature delta is valid, and the signature of the message m by the signer is illegal if the signature delta is invalid. The certificateless signature method can resist stronger attackers, improve the operation efficiency, and be widely applied to a distributed network environment to realize data sharing.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to an efficient and safe non-certificate signature method in the field of distributed network communication, which can be used to realize safe sharing of data in a distributed network. Background technique [0002] With the development of computer and network communication technology, digital signature technology has been widely used. The traditional digital signature technology is based on the public key infrastructure PKI. PKI maintains and manages a public key certificate store, so it requires huge communication, calculation and storage costs. In order to solve the problem of the authenticity of the public key and reduce the communication, calculation and storage costs of the system, the identity-based digital signature technology IBS is adopted. However, there is an inherent defect in IBS, namely the key escrow problem. In order to solve the key escrow problem in IBS, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 庞辽军许克东
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products