Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blind signature generation method based on SM9 digital signature algorithm

A digital signature and blind signature technology, applied in the field of information security, can solve the problems that the signer does not know the specific content of the signed message, cannot sign and track, and achieves the effects of strong security, correctness, and privacy

Active Publication Date: 2021-06-29
WUHAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The signer does not know the specific content of the signed message, and the signature cannot be traced after signing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blind signature generation method based on SM9 digital signature algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0021] The meaning of the parameters in this embodiment:

[0022] KGC: Key Generation Center

[0023] Signer, User: both parties to the communication.

[0024] The additive cyclic group of order N is a prime number.

[0025] A multiplicative cyclic group of prime order N.

[0026] e: from arrive bilinear pairing.

[0027] g u : multiplicative group in the u power of g.

[0028] h 1 (·), H 2 ( ): by {0, 1} * arrive cryptographic hash function.

[0029] ID U : The identification of the communication party U, which can uniquely determine the public key of the communication party U.

[0030] D. ID : The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blind signature generation method based on an SM9 digital signature algorithm. The generation process is jointly participated by two parties, one party is a Signer, and the other party is a User, and the blind signature generation steps are as follows: 1) generating, by the Signer, a random number to calculate a first temporary variable R = r * P1, and sending R to the User; 2) after the User receives the R, generating two random numbers to calculate a second temporary variable w = e (alpha * R + alpha * beta * P1, Ppub-s), converting the data type of w into a bit string, then calculating a hash value h = H2 (Mll w, N) and a third temporary variable h' = alpha<-1> * h-beta mod N of the message M to be signed, and finally sending the h' to the Signer; 3) after the Signer receives the h', calculating a fourth temporary variable S' = (r-h ') * DID, and sending the S' to the User; and 4) after the User receives the S', calculating a signature value S = alpha * S', and outputting a signature (h, S). According to the method, on the basis of not changing the overall architecture of the SM9 signature algorithm, the message with a signature is blinded in the signature process, and the signature can be completed under the condition that the message is not leaked.

Description

technical field [0001] The invention relates to information security technology, in particular to a blind signature generation method based on SM9 digital signature algorithm. Background technique [0002] Digital signature is a kind of security protection technology that emerges with the development of information network technology. The purpose is to realize the function of traditional handwritten signature through technical means, and to identify the identity of the signer and the legality of the data content. It can also verify whether the original text of the document has changed during the transmission process, ensuring the integrity, authenticity and non-repudiation of the transmitted electronic document. Digital signature is an important part of public key cryptosystem and plays an important role in many occasions. [0003] Normally, the signer must know what the message he is signing is in order to sign the message. In many cases, when the signer is required to si...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0825H04L9/0869H04L9/3257
Inventor 何德彪张韵茹罗敏彭聪周朕
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products