Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Certificateless verifiable encrypted signature method with forward security

A forward-secure, certificate-free technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve problems such as security hazards in signing contracts, and ensure forward security, high security and fairness , the effect of high computational efficiency

Inactive Publication Date: 2015-07-15
NANJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Once the key of the signature scheme is leaked, the security of the previously signed contract will be seriously compromised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless verifiable encrypted signature method with forward security
  • Certificateless verifiable encrypted signature method with forward security
  • Certificateless verifiable encrypted signature method with forward security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Such as figure 1 , 2 As shown, the present invention discloses a forward secure non-certificate verifiable encrypted signature method, setting the private key of the actual signature as a constant related to a specific time period, and safely deleting the unused key; at the same time, A trusted third party is added as an arbitrator, and when a dispute occurs, the arbitrator will rule.

[0036] Concrete steps are as follows: (1) generate system parameter; Establish KGC public parameter params={G 1 ,G 2 ,e,q,P,P pub ,g,H 1 ,H 2}, where G1, G2 are additive cyclic groups and multiplicative cyclic groups with order q and generator P; e is bilinear pairing G 1 ×G 1 →G 2 , P pub =sP is the system public key, g=e(P,P); the Hash function is

[0037] H 1 { { 0,1 } * → G 1 , H ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a certificateless verifiable encrypted signature method with forward security, and belongs to the technical field of computer network and information security. According to the method, the timestamp is embedded into secret values of a certificateless signature algorithm, secret values which are not used is safely deleted, and signature key evolution and digital signature are really combined; a traditional certificateless signature algorithm sequence is changed, the set secrete values are generated before part of private keys are generated, meanwhile, public keys are bound to a Hash function, the parameter correlation degree in the signature algorithm is increased, and two types of enemy attacks of the certificateless environment are resisted; a generated verifiable encrypted signature comprises the user secret values and has the forward security; the computation burden of a signature scheme is small, the signature is short, and the whole performance is advantageous. The certificateless verifiable encrypted signature method with the forward security has very high security and fairness.

Description

technical field [0001] The invention is a non-certificate verifiable encrypted signature method suitable for online contract signing, which belongs to the technical field of computer network and information security. Background technique [0002] In the era of open Internet, e-commerce is more and more used in economic activities, and signing contracts through the Internet has gradually become a common economic form. How to ensure the security and fairness of contract signing in an open network environment has become a challenge. Especially important, which requires a secure digital signature algorithm. The digital signature algorithm is based on the public key cryptography system. The identity-based public key cryptography system uses user identity information as the user public key. Although it simplifies the issuance and management of public key certificates, there is a key escrow problem. In the certificateless public key cryptosystem, the signature private key is compo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 夏爱东王志伟陈峰何明君
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products