Two-party distributed identity-based RSA digital signature generation method and system

A technology of digital signature and generation system, applied in the field of information security, which can solve the problems of weak signature key protection and key leakage

Inactive Publication Date: 2018-04-06
WUHAN UNIV
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The implementation method based on secret sharing has weak protec...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-party distributed identity-based RSA digital signature generation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention is further elaborated below in conjunction with embodiment.

[0040] First, first explain the symbols and definitions.

[0041] A, B: The two sides of the communication.

[0042] gcd(a,b): the greatest common divisor of integer a and integer b, if gcd(a,b)=1, then a and b are said to be mutually prime.

[0043] The number of numbers in 1,2,...,n that are relatively prime to n.

[0044] g u : g to the power of u, namely where u is a positive integer.

[0045] h 1 (·),H 2 ( ): by {0,1} * arrive cryptographic hash function.

[0046] modn: modulo n operation.

[0047] ab: Integer a, b multiplied.

[0048] Second, the first is the signature key generation algorithm of both parties in communication.

[0049] In the present invention, the key generation center (KGC) is a trusted third party, which is mainly responsible for generating system parameters and signature keys. Given the identity ID of the user, in order to generate the partial ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a two-party distributed identity-based RSA digital signature generation method and system. The method and system are implemented through the following technical schemes: a KGCgenerates partial signature keys FORMULA 1 and FORMULA 2 (as shown in the original document) for two communication parties A and B that participate in a digital signature respectively, after the partial signature keys are received, B firstly selects two random numbers k1, k2, calculates the formulas of mu1=g1k1 and mu2=H1(ID)k2, and sends mu1 and mu2 to A; and then A selects two random numbers k3, k4, calculates a first partial signature h, and sends FORMULA (as shown in the original document) to B; B calculates s1, s2 by using the own partial signature key, and sends s1, s2 to A; and after receiving s1, s2, A calculates a second partial signature FORMULA (as shown in the original document) by using the own partial signature key, and after the signature verification is successful, A publishes a complete RSA digital signature (h, S). According to the scheme of the invention, the security of the signature keys can be improved, and the fairness of signature schemes can also be ensured.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a method and system for generating a digital signature based on two-party distributed RSA. Background technique [0002] With the rapid development and popularization of communication technology, the application fields of computer networks are becoming more and more extensive, and have involved many fields such as finance, commerce, military affairs, and diplomacy. The application of network technology and various information technologies has brought great convenience to our life. It makes us no longer limited by time and space, and can exchange information with individuals or organizations in any corner at any time and any place. . But at the same time, how to ensure the security of information is an urgent problem to be solved. [0003] Digital signature is an effective method to solve information security in network communication, and it is used to replace handwritten sig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/302H04L9/3249
Inventor 何德彪马米米王婧冯琦
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products