Anti-quantum-attack electronic signature method and anti-quantum-attack electronic signature system

An anti-quantum attack, electronic signature technology, applied in the field of electronic signature methods and systems, can solve problems affecting the amount and efficiency of communication data, insecure cryptography, high security risks, etc., to eliminate security based on computing security. Defects, low computational complexity, the effect of fewer encryption times

Pending Publication Date: 2022-07-01
QUANTUMCTEK +1
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the face of the foreseeable research and construction of quantum computers, cryptographic systems based on computational complexity are not safe, and there are high security risks
[0005] According to the inventor's understanding, some researchers also want to improve the above problems. However, the current improvement methods mostly adopt relatively complicated signature or encryption methods. For example, the patent document of CN109560935A provides a kind of anti-quantum based on public asymmetric key pool. The computational signature method and the signature system use the anti-quantum computing public key generated by the seal public key combined with the asymmetric key pool in the key card, and hide the public key of the seal by disclosing the anti-quantum computing public key to realize the electronic signature. Anti-quantum computing characteristics, but in the signature encryption method it provides, it uses one RSA signature, one symmetric encryption and one RSA encryption, and the calculation amount is about twice that of the ordinary RSA signature method
Similarly, the amount of calculation involved in decrypting and verifying the signature is about twice that of the normal verification method. Signature and verification involve a large amount of calculation, which affects the amount of communication data and efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum-attack electronic signature method and anti-quantum-attack electronic signature system
  • Anti-quantum-attack electronic signature method and anti-quantum-attack electronic signature system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] This embodiment provides an electronic signature system that is resistant to quantum attacks, relying on the abundant symmetric key resources of the quantum cryptography network, specifically as follows figure 1 shown.

[0043] The whole system includes a trusted center, an electronic signature server, and an applicant for signature (terminal equipment). The functions of each component of the system are detailed as follows:

[0044] The trusted center is a trusted third-party organization, located at the terminal of the quantum cryptography network. The trusted center has a true random number signature key store (hereinafter referred to as the signature key store), which is used for digital signature of electronic signature data. Divide the keys of the keystore according to the length used for each digital signature, and sequentially number the divided keys. The trusted center keeps each key used for signing and its number until the validity period of the key's signature...

Embodiment 2

[0054] Based on the system of Embodiment 1, it provides such as figure 2 The signature process shown is detailed below:

[0055] The signature applicant uses the registration ID to initiate a signature application to the electronic signature server, and the electronic signature server and the signature applicant use the shared key for authentication.

[0056] The authentication process is as follows:

[0057] After the electronic signature server receives the signature application request, it sends the random number r1 to the signature applicant;

[0058] The applicant for signature receives r1, and uses the unused shared key K with serial number n to calculate HMAC(r1||SID||n; K), where SID is the ID of the applicant for signature, and || represents the data connection operation;

[0059] The signature applicant selects a random number r2, and sends r2, n and HMAC (r1||SID||n; K) to the electronic signature server;

[0060] The electronic signature server reads the shared...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anti-quantum-attack electronic signature method and system, and the method comprises the steps: obtaining a signature application, and carrying out the identity verification of a signature applicant; receiving the electronic seal information and the to-be-signed document, generating electronic signature document information, calculating a ciphertext and a message authentication code of the electronic signature document information by using the shared key, and feeding back the corresponding ciphertext and the message authentication code to a signature applicant for decryption to obtain the document; calculating a message digest of the electronic signature document information, calculating an authentication code of the message digest by using another shared key, sending the message digest and the authentication code to a third party for verification, waiting for a verification result of the third party and a comparison result of the third party on the document and the message digest, and when the verification result and the comparison result pass, sending the electronic signature document information to the third party; the signature applicant obtains the electronic signature information after the third party carries out the symmetric key digital signature; according to the method, the calculation complexity is reduced, and meanwhile, the quantum aggression resistance can be ensured.

Description

technical field [0001] The invention belongs to the technical field of encrypted communication of a quantum cryptographic network, and in particular relates to an electronic signature method and system for resisting quantum attacks. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] With the rapid development of information technology, in order to improve the reliability and convenience of online information, electronic signatures came into being. An electronic signature is not a digital image of a written signature and seal, it exists in the form of an electronic code. With electronic signatures, recipients can transmit documents over the network and can easily verify the sender's identity and signature. It also verifies that the original text of the document has not changed during transmission. Electronic signatures help to identify the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3247H04L9/3242H04L9/3239
Inventor 不公告发明人
Owner QUANTUMCTEK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products