Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Certificateless multivariable broadcast multi-signature method

A multi-signature and multi-variable technology, applied in the field of network information security, to resist quantum computing attacks and verify the small amount of computation

Active Publication Date: 2019-08-30
XIAN UNIV OF POSTS & TELECOMM
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is currently no multi-variable broadcast multi-signature method based on certificates. How to construct multi-variable broadcast multi-signatures using certificateless public key cryptography is a technical problem that needs to be solved urgently in cryptography.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless multivariable broadcast multi-signature method
  • Certificateless multivariable broadcast multi-signature method
  • Certificateless multivariable broadcast multi-signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] In this embodiment, the finite field K whose feature p is 2, order q is 256, n is 42, and r is 24 multivariate equations is taken as an example. The multivariate broadcast multi-signature method based on no certificate consists of the following steps (such as figure 1 shown):

[0065] A. Establish system parameters

[0066] (A1) The key generation center defines a finite field K with feature p and order q. In this embodiment, p is 2 and order q is 256.

[0067] (A2) The key generation center defines n-ary r multivariate equations on the finite field K. In this embodiment, n is 42 and r is 24.

[0068] P=(p 1 (x 1 ,x 2 ,···,x 42 ),···,p i (x 1 ,x 2 ,···,x 42 ),···,p 24 (x 1 ,x 2 ,···,x 42 ))

[0069] Each equation system p i is about the variable x being x 1 ,x 2 ,...,x 42 The nonlinear quadratic equation of where i is 1,2,…,24:

[0070]

[0071] Among them, each coefficient α, β, γ and variable x are in the finite field K.

[0072] (A3) The key ge...

Embodiment 2

[0121] In this embodiment, the finite field K whose characteristic p is 2, order q is 256, n is 30, and r is 25 multivariate equations is taken as an example. The certificate-free multivariate broadcast multi-signature method consists of the following steps:

[0122] A. Establish system parameters

[0123] (A1) The key generation center defines a finite field K with feature p and order q. In this embodiment, p is 2 and order q is 256.

[0124] (A2) The key generation center defines n-ary r multivariate equations on the finite field K. In this embodiment, n is 30 and r is 25.

[0125] P=(p 1 (x 1 ,x 2 ,···,x 30 ),···,p i (x 1 ,x 2 ,···,x 30 ),···,p 25 (x 1 ,x 2 ,···,x 30 ))

[0126] Each equation system p i is about the variable x being x 1 ,x 2,...,x 30 The nonlinear quadratic equation of where i is 1,2,…,25:

[0127]

[0128] Among them, each coefficient α, β, γ and variable x are in the finite field K.

[0129] (A3) The key generation center selects a c...

Embodiment 3

[0171] In this embodiment, the finite field K whose characteristic p is 2, order q is 512, n is 42, and r is 24 multivariate equations is taken as an example. The multivariate broadcast multi-signature method based on no certificate consists of the following steps:

[0172] A. Establish system parameters

[0173] (A1) The key generation center defines a finite field K with feature p and order q. In this embodiment, p is 2 and order q is 512.

[0174] (A2) The key generation center defines n-ary r multivariate equations on the finite field K. In this embodiment, n is 42 and r is 24.

[0175] P=(p 1 (x 1 ,x 2 ,···,x 42 ),···,p i (x 1 ,x 2 ,···,x 42 ),···,p 24 (x 1 ,x 2 ,···,x 42 ))

[0176] Each equation system p i is about the variable x being x 1 ,x 2 ,...,x 42 The nonlinear quadratic equation of where i is 1,2,…,24:

[0177]

[0178] Among them, each coefficient α, β, γ and variable x are in the finite field K.

[0179] (A3) The key generation center sel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a certificateless multivariable broadcast multi-signature method. The method comprises the steps of establishing system parameters, generating part of keys, generating signature keys, performing signing and performing verifying. The invention provides a certificateless multivariable broadcast multi-signature method by combining a certificateless public key cryptosystem anda broadcast multi-signature technology under a multivariable public key cryptosystem, and the method solves the problem of key hosting of the identity-based public key cryptosystem. The final multi-signature length is irrelevant to the number of signers, the verification time of the multi-signature is consistent with the verification time of a single part of signature, and the method has the advantages of signature, small verification calculation amount, quantum computing attack resistance and the like, and can be applied to the fields of vehicle-mounted networks, education systems and the like.

Description

technical field [0001] The invention belongs to the technical field of network information security, and specifically relates to cryptography or a multivariable public key cryptosystem or a certificateless public key cryptosystem or a broadcast multi-signature method. Background technique [0002] Multi-signatures are divided into ordered multi-signatures and broadcast multi-signatures according to the order of signatures. It can realize multiple users to sign and authenticate the same electronic file. At present, most broadcast multi-signatures are based on traditional public key cryptosystems, and their security is mainly based on the intractability of large integer decomposition problems or discrete logarithm problems. The emergence of quantum algorithms and the imminent birth of quantum computers will pose a threat to the broadcast multi-signature method based on traditional public key cryptography, and the identity-based broadcast multi-signature method has key escrow p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0825
Inventor 俞惠芳付帅凤
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products