Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A blind signature generation method based on sm9 digital signature algorithm

A digital signature and blind signature technology, applied in the field of information security, can solve the problems that the signer does not know the specific content of the signed message and cannot sign the signature, and achieves the effect of strong security, guaranteeing correctness and guaranteeing privacy.

Active Publication Date: 2022-08-05
WUHAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The signer does not know the specific content of the signed message, and the signature cannot be traced after signing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blind signature generation method based on sm9 digital signature algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0021] The meaning of the parameters in this example:

[0022] KGC: Key Generation Center

[0023] Signer, User: Both parties of the communication.

[0024] Additive cyclic group of order prime N.

[0025] A multiplicative cyclic group of order prime N.

[0026] e: from arrive bilinear pairing.

[0027] g u : Multiplicative group where g is raised to the power of u.

[0028] H 1 ( ), H 2 ( ): by {0, 1} * arrive cryptographic hash function.

[0029] ID U : The identity of the communicating party U, which can uniquely determine the public key of the communicating party U.

[0030] D ID : The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blind signature generation method based on SM9 digital signature algorithm. The generation process involves two parties, one is the signer Signer, the other is the user User, and the steps of generating the blind signature are as follows: 1) The signer Signer generates a random signature Number calculation first temporary variable R=r·P 1 , and send R to the user User; 2) After the user User receives R, generate two random numbers to calculate the second temporary variable w=e(α·R+α·β·P 1 , P pub‑s ), and convert the data type of w into a bit string, and then calculate the hash value h=H of the message M to be signed 2 (M||w, N) and the third temporary variable h′=α ‑1 h‑βmod N, and finally send h′ to Signer; 3) Signer calculates the fourth temporary variable S′=(r‑h′) D after receiving h′ ID , and send S' to User; 4) After User receives S', calculate the signature value S=α·S', and output the signature (h, S). On the basis of not changing the overall structure of the SM9 signature algorithm, the invention blinds the message with the signature in the signature process, and can complete the signature under the condition that the message is not leaked.

Description

technical field [0001] The invention relates to information security technology, in particular to a blind signature generation method based on SM9 digital signature algorithm. Background technique [0002] Digital signature is a security technology that emerges with the development of information network technology. The purpose is to realize the function of traditional handwritten signature through technical means, which is used to identify the identity of the signer and the legitimacy of the data content. It can also verify whether the original text of the document has changed during the transmission process, and ensure the integrity, authenticity and non-repudiation of the transmitted electronic document. Digital signature is an important part of public key cryptosystem and plays an important role in many occasions. [0003] Typically, a signer must know what message he is signing before signing a message. In many cases, when a signer is required to sign a message, he do...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0825H04L9/0869H04L9/3257
Inventor 何德彪张韵茹罗敏彭聪周朕
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products