Point-to-point elliptic-curve type digital signature algorithm and signature verification method based on the same

An elliptic curve and digital signature technology, applied in the field of information security, can solve problems such as inability to implement man-in-the-middle attacks

Inactive Publication Date: 2017-03-22
SHANGHAI HUAHONG INTEGRATED CIRCUIT
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0025] The technical problem to be solved by the present invention is to provide a point-to-point elliptic curve digital signature algorithm, which can effectively solve the problem of point-to-point signature; at the same time, compared with the traditional elliptic curve signature method, it is guaranteed that man-in-the-middle attacks cannot be realized on other node IDs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Point-to-point elliptic-curve type digital signature algorithm and signature verification method based on the same
  • Point-to-point elliptic-curve type digital signature algorithm and signature verification method based on the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] figure 1 The following flow charts are provided to illustrate specific implementation details of the present invention.

[0052] The National Institute of Standards and Technology (NIST) recommends five sets of parameters for elliptic curve cryptography in the prime field. One set of parameters is adopted in this embodiment, which is as follows:

[0053] In a finite field Fp, there is an elliptic curve E, which is defined as follows:

[0054] E: y 2 =x 3 +ax 2 +b

[0055] in:

[0056] p = 0xFFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF;

[0057]a = 0xFFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC;

[0058] b=0x5ac635d8aa3a93e7b3ebbd55769886bc651d06b0cc53b0f63bce3c3e27d2604b.

[0059] The coordinates of the base point P are,

[0060] [0x6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296,

[0061] 0x4fe342e2fe1a7f9b8ee7eb4a7c0f9e162bce33576b315ececbb6406837bf51f5]

[0062] The order n of the base point is,

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an improved point-to-point elliptic-curve type digital signature algorithm. The algorithm comprises the following steps that: (1), a formula t=Hash(IDA||IDB||count)mod n is calculated, wherein the count is equal to 0X00000001; and if t is equal to 0, the count++ is realized and the t is calculated again; (2), k belonging to [1, n-1] is selected randomly; (3), a formula kP=(x1,y1) is operated and the x1 is transformed into an integer; (4), a formula r=x1 mod n is calculated; and if the r is equal to 0, the step (2) is carried out again; (5), an expression e=H(m) is calculated, wherein the H(x) is a hash function; (6), an expression s=k <1>t (e+dr) mod n is calculated; if the s is equal to 0, the step (2) is carried out again to obtain a random number; and (7), a signature pair (r,s) is outputted. In addition, the invention also discloses a signature verification method based on the improved point-to-point elliptic-curve type digital signature algorithm. A point-to-point signature verification behavior is realized.

Description

technical field [0001] The invention relates to the field of information security, in particular to a point-to-point Elliptic Curve Digital Signature Algorithm (ECDSA). The invention also relates to a signature verification method based on the improved elliptic curve digital signature algorithm. Background technique [0002] 1. Introduction to Elliptic Curve Digital Signature Algorithm [0003] Digital signature corresponds to the digitization of handwritten signature, which can provide data source authentication, data integrity and non-repudiation. Elliptic Curve Digital Signature Algorithm is the elliptic curve version of digital signature. The specific process of ECDSA is as follows: [0004] Input parameter group D=(q, FR, S, a, b, P, n, h), private key d, message m. [0005] output signature pair (r, s) [0006] a. Randomly select k ∈ [1, n-1]; [0007] b operation kP=(x 1 ,y 1 ), then put x 1 converted to an integer; [0008] c. Calculate r=x 1 mod n, if r=0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32H04L29/06
CPCH04L9/3066H04L9/3226H04L9/3252H04L63/0876
Inventor 张宇
Owner SHANGHAI HUAHONG INTEGRATED CIRCUIT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products