Improved elliptic curve digital signature algorithm and signature verification method thereof

An elliptic curve and digital signature technology, applied in the field of information security, can solve the problems that fraud cannot be implemented, ECDSA signature cannot be reused by others, etc.

Inactive Publication Date: 2017-06-16
SHANGHAI HUAHONG INTEGRATED CIRCUIT
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] 2. Mafia scam
[0024] Therefore, if the digital signature is improved and the digital signature is introduced into the time parameter, then when Alice digitally signs Bob's bill, and Bob passes Alice's digital signature to Carol, Alice's digital signature is already invalid, so the black hand The party will not be able to carry out the scam
[0025] The original ECDSA signature can be reused, and when the time factor is introduced, the ECDSA signature cannot be reused by others

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved elliptic curve digital signature algorithm and signature verification method thereof
  • Improved elliptic curve digital signature algorithm and signature verification method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] figure 1 The following flow charts are provided to illustrate specific implementation details of the present invention.

[0051] The National Institute of Standards and Technology (NIST) recommends five sets of parameters for elliptic curve cryptography in the prime field. One set of parameters is adopted in this embodiment, which is as follows:

[0052] in the finite field F P In , there is an elliptic curve E, which is defined as follows:

[0053] E: y 2 =x 3 +ax 2 +b

[0054] in:

[0055] p = 0xFFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF;

[0056] a = 0xFFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC;

[0057] b=0x5ac635d8aa3a93e7b3ebbd55769886bc651d06b0cc53b0f63bce3c3e27d2604b.

[0058] The coordinates of the base point P are,

[0059] [0x6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296,

[0060] 0x4fe342e2fe1a7f9b8ee7eb4a7c0f9e162bce33576b315ececbb6406837bf51f5]

[0061] The order n of the base point ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an improved elliptic curve digital signature algorithm. Before identity identification, a signature side and a signature verification side obtains a time random number t from a trusted third party. The improved elliptic curve digital signature algorithm comprises: step one, a k belonging to [1, n-1] is selected randomly; step two, operation of kP=(x1,y1) is carried out and then the x1 is converted into an integer; step three, calculation is carried out based on a formula: r=x1mod n, wherein if the r is equal zero, the step one is carried out again and a random time number t is obtained from the trusted third party; step four, a formula e=H(m) is calculated, wherein the H(x) express a hash function; step five, calculation is carried out based on a formula: s=k<-1>t(e+dr)mod n, and if the s is equal to zero, the step one is carried out again and a random time number t is obtained from the trusted third party; and step six, a signature pair (r,s) is outputted. In addition, the invention also discloses a signature verification method based on the improved elliptic curve digital signature algorithm. Therefore, a behavior of signature countering by an intermediary can be avoided.

Description

technical field [0001] The invention relates to the field of information security, in particular to an improved Elliptic Curve Digital Signature Algorithm (ECDSA). The invention also relates to a signature verification method based on the improved elliptic curve digital signature algorithm. Background technique [0002] 1. Introduction to Elliptic Curve Digital Signature Algorithm [0003] Digital signature corresponds to the digitization of handwritten signature, which can provide data source authentication, data integrity and non-repudiation. Elliptic Curve Digital Signature Algorithm is the elliptic curve version of digital signature. The specific process of ECDSA is as follows: [0004] Input parameter group D=(q, FR, S, a, b, P, n, h), private key d, message m. [0005] Output the signature pair (r, s). [0006] a. Randomly select k ∈ [1, n-1]; [0007] b. Operation kP=(x 1 ,y 1 ), then put x 1 converted to an integer; [0008] c. Calculate r=x 1 mod n, if r=...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/3252
Inventor 张宇马博吴江源
Owner SHANGHAI HUAHONG INTEGRATED CIRCUIT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products