CN103259662A - Novel procuration signature and verification method based on integer factorization problems - Google Patents

Novel procuration signature and verification method based on integer factorization problems Download PDF

Info

Publication number
CN103259662A
CN103259662A CN2013101574422A CN201310157442A CN103259662A CN 103259662 A CN103259662 A CN 103259662A CN 2013101574422 A CN2013101574422 A CN 2013101574422A CN 201310157442 A CN201310157442 A CN 201310157442A CN 103259662 A CN103259662 A CN 103259662A
Authority
CN
China
Prior art keywords
signature
allograph
people
entrustment
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013101574422A
Other languages
Chinese (zh)
Other versions
CN103259662B (en
Inventor
禹勇
夏琦
倪剑兵
黄可
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201310157442.2A priority Critical patent/CN103259662B/en
Publication of CN103259662A publication Critical patent/CN103259662A/en
Application granted granted Critical
Publication of CN103259662B publication Critical patent/CN103259662B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a novel procuration signature and verification method based on integer factorization problems. The novel procuration signature and verification method based on the integer factorization problems includes the steps: before a network operates, firstly generating personal public keys and private keys by original signature people and procuration signature people, and issuing the public keys; when signature requests are provided, generating authorization letters by the original signature people, and calculating signature authorization based on a chameleon hash function and an ordinary digital signature algorithm, sending the signature authorization to the procuration signature people, carrying out validity verification on the received signature authorization by the procuration signature people, if the signature authorization is effective, generating the procuration signature based on collision property of the chameleon hash function, and digital signature does not need to be carried out on information, when a verifier receives the authorization letters and the procuration signature, firstly, verifying whether the authorization letters are effective or not, after the authorization letters are verified to be effective, and then verifying validity of the procuration signature. According to the application of the novel procuration signature and verification method based on the integer factorization problems, processing efficiency of the procuration signature is high, and the length of the procuration signature is short. The novel procuration signature and verification method based on the integer factorization problems is suitable for environments such as mobile networks and the wireless networks where computing power and network bandwidth are limited.

Description

A kind of new allograph and verification method based on the integer resolution problem
Technical field
The invention belongs to the network security technology field, relate to public key cryptography and digital signature, be specifically related to a kind of new allograph and verification method based on the integer resolution problem.
Background technology
Along with development of computer network with popularize, information security issue also becomes the social concern that common people pay close attention to, and in information world, how to realize authenticating, data integrity and non-repudiation become the emphasis that numerous scholars explore.Digital signature is as the digital substitute of handwritten signature, the natural broad research that has obtained password educational circles.Need based on different application in people's real life, numerous have the digital signature scheme of special purpose to be proposed in succession, and allograph is the important means that solves the signature authorises problem in the digital signature.To be an entity or colony entrust to a kind of behavior that another one entity or colony implement to some the signature rights of oneself to signature authorises, and this mandate is needing the occasion of commission order that important application is arranged such as mobile agent, Distributed Calculation, grid computing and wireless network etc.
In existing allograph method based on the integer resolution problem, adopt the string data mode to realize: original signature people is the certificate of entrustment (PKI that comprises the original signature people to generating at first, allograph people's PKI, the term of validity of authorizing and allograph message etc.) carry out digital signature, obtain signature authorises and (comprise certificate of entrustment, certificate of entrustment is signed) and send to the allograph people, the allograph people utilizes signature authorises and the private key of oneself, message in the certificate of entrustment is carried out digital signature, produce final allograph, and this allograph is made up of to information signature two parts signature authorises and the allograph people of original signature.
During the last ten years, Chinese scholars has been carried out deep research to allograph, has obtained great successes, comprises the discussion to security model, proposes new departure, to the analysis of existing scheme and improvement etc.Yet also there are following problem in the research of allograph and application:
(1) present allograph mostly utilizes bilinearity to designing, and the operand that bilinearity is right is big, and is many to the consumption of computational resource, can't be applied to the computing capability constrained environment;
(2) existing allograph based on the integer resolution problem is the signature authorises of original signature and allograph people two signatures of signature of message to be made of in essence, this makes that final allograph length is long, the transmission of allograph can consume more bandwidth, is not suitable for the limited network environment of bandwidth;
(3) existing several allograph method based on the integer resolution problem proves because rational security model and fail safe are not provided, cause to resist a kind of or two kinds of attacks in outside opponent, malicious agent signer, three types of attacks of malice original signature people, so existing several allograph method based on the integer resolution problem is generally dangerous.
Summary of the invention
Goal of the invention of the present invention is: at the problem of above-mentioned existence, provide the new allograph method based on the integer resolution problem that a kind of processing speed is fast, allograph length is short.
A kind of new allograph method based on the integer resolution problem of the present invention comprises the following steps:
Step 1: generate original signature people's private key, PKI, allograph people's private key, PKI;
Step 2: the allograph people generates interim PKI r according to its private key, PKI 1, and send to the original signature people;
Step 3: original signature people receives interim PKI r 1After, at first generating certificate of entrustment w, this certificate of entrustment w comprises original signature people's PKI, allograph people's PKI, the term of validity of mandate and the message m of allograph, selects integer t more at random 0, based on the cryptographic Hash h of the certificate of entrustment w calculating chameleon hash function that generates 2, and to described cryptographic Hash h 2Carry out digital signature, obtain certificate of entrustment w signature; And by safe lane signature authorises being sent to the allograph people, described signature authorises comprises certificate of entrustment w, certificate of entrustment signature, integer t 0
Step 4: the allograph people carries out validation verification to the signature authorises of receiving, if effectively, then execution in step 5;
Step 5: the allograph people verifies whether the allograph message m meets certificate of entrustment w, if, then:
Private key, PKI according to the allograph people generate interim PKI r 2
According to described interim PKI r 2, based on collision (certificate of entrustment w, the integer t of chameleon hash function 0Chameleon hash functional value and message m, random number t 1The chameleon hash functional value equate, be cryptographic Hash h 2) generation message m random number corresponding t 1
By certificate of entrustment signature, interim PKI r 2, random number t 1Constitute the allograph of message m under certificate of entrustment w.
Realize allograph of the present invention owing to the present invention is based on the collision of chameleon hash function, guaranteeing under the prerequisite that no key is revealed, its processing speed is fast, resource consumption is few, and final allograph is shorter than the length of existing Proxy Signature Scheme based on the integer resolution problem, allograph people of the present invention is based on the collision of chameleon hash function, only need find out the collision of given chameleon hash value (based on the cryptographic Hash of the chameleon hash function of certificate of entrustment w), just can generate allograph, and need not to calculate again signature to message m, shorten the length of existing allograph based on the integer resolution problem, reduced the amount of calculation of allograph generative process; And because the length of allograph of the present invention is short, the bandwidth that its transmission consumes is few, is specially adapted to the signature authorises business of resource-constrained wireless network environment.
Simultaneously, by the generative process of allograph of the present invention as can be known, its allograph has unforgeable, and this has just resisted malicious agent signer's attack; And under the prerequisite of the trapdoor of not knowing chameleon hash function of the present invention (trap door information), original signature people can't forge allograph, and this has just prevented malice original signature people's attack; The attack resource that has because of outside opponent is far fewer than malicious agent signer and malice original signature people, so since the present invention can resist malicious agent signer and malice original signature people's attack, then also can resist outside opponent's attack.
Further, in order to ensure allograph method validation of the present invention fail safe, in step 1, select the p that satisfies condition at random according to security parameter k 0≡ 3mod8, q 0The prime number p of ≡ 7mod8 0, q 0As original signature people's private key, and with p 0, q 0Product n 0As original signature people PKI.
In order further to improve fail safe of the present invention, allograph people's of the present invention private key, PKI can be:
Select two safe prime p at random according to security parameter k 1, q 1Private key for the allograph people; Get p 1, q 1Product be N1, select the multiplication group of integers
Figure BDA00003133921600031
On an integer λ (n 1) the element g on rank, described
Figure BDA00003133921600032
Integer
Figure BDA00003133921600033
Figure BDA00003133921600034
Then with described n 1, g is as allograph people's PKI.
The invention allows for a kind of signature verification method at allograph method of the present invention, comprise the following steps:
Whether the checking message m meets certificate of entrustment w, if not, then stops; Otherwise,
Based on message m, certificate of entrustment w, allograph, and whether allograph people's PKI, original signature people's PKI surveying agent signature is effective.
In sum, owing to adopted technique scheme, the invention has the beneficial effects as follows:
(1) length of allograph of the present invention is short, and the allograph processing speed is fast, and resource consumption is few;
(2) because the length of allograph of the present invention is short, the bandwidth that its transmission consumes is few, is specially adapted to the authorization activities of resource-constrained wireless network environment;
(3) the present invention is because Proxy Signature Scheme can be resisted original signature people's the attack of allograph people, the malice of outside opponent, malice, the theoretical proof fail safe of the present invention of deriving can be foretelling under the machine model stipulations at random to the integer resolution problem, and is safe.
Description of drawings
To illustrate by example and with reference to the mode of accompanying drawing, wherein:
Fig. 1 is allograph process flow diagram of the present invention;
Fig. 2 is that signature authorises of the present invention generates-verify flow chart;
Fig. 3 is that allograph of the present invention generates-verify flow chart.
Embodiment
Disclosed all features in this specification, or the step in disclosed all methods or the process except mutually exclusive feature and/or step, all can make up by any way.
Disclosed arbitrary feature in this specification (comprising any accessory claim, summary and accompanying drawing) is unless special narration all can be replaced by other equivalences or the alternative features with similar purpose.That is, unless special narration, each feature is an example in a series of equivalences or the similar characteristics.
With reference to Fig. 1, specific implementation process of the present invention is as follows:
Process 1, the key of original signature people Alice and allograph people Bob generates
(1.1) before the network operation, Alice selects the p that satisfies condition at random according to security parameter k 0≡ 3mod8 and q 0The prime number p of ≡ 7mod8 0And q 0, i.e. p 0For divided by 8 remainders being arbitrary prime number of 3, q 0For divided by 8 remainders being arbitrary prime number of 7, with p 0And q 0As the long-term private of Alice, and calculate prime number p 0And q 0Product n 0=p 0q 0PKI as Alice;
(1.2) Bob selects two safe prime p at random according to security parameter k 1, q 1And group
Figure BDA00003133921600041
On an integer λ (n 1) the element g on rank, the computationally secure prime number p 0And q 0Product n 1=p 1q 1, integer
Figure BDA00003133921600042
Figure BDA00003133921600048
With the Ka Mixieer function
Figure BDA00003133921600043
Select the group then
Figure BDA00003133921600044
Last element g.The PKI of Bob and private key are respectively (n 1, g) with (p 1, q 1).
So-called safe prime namely requires the prime number of selection according to security parameter, and security parameter is the security requirement that obtains agreement according to scheme, and a pre-determined parameter of describing fail safe is binary bits how long in order to determine safe prime.Security parameter is made as k among the present invention, and value is generally 512,768,1024 or 2048 etc.
Process 2, original signature people Alice licenses to allograph people Bob with signature capabilities
When Alice has the demand of signature information, but when busier or own need limited in one's ability license to Bob with signature capabilities because of self, the Alice calculating and sending gives its signature authorises to give Bob, and whether Bob mandate of checking Alice earlier before generating allograph is effective.With reference to Fig. 2, being implemented as follows of this process:
(2.1) when Alice need license to Bob with signature capabilities, at first generate certificate of entrustment w, this certificate of entrustment comprises the PKI of Alice, the PKI of Bob, the term of validity of mandate and the message m of allograph etc.;
(2.2) Bob selects temporary private
Figure BDA00003133921600045
And calculate interim PKI
Figure BDA00003133921600046
Interim PKI r 1Send to Alice;
(2.3) Alice receives interim PKI r 1After, utilize certificate of entrustment w and the private key (p of oneself 0, q 0) generate its signature authorises (w, t 0, s 0, a 0, b 0), and by safe lane signature authorises is sent to Bob; The implementation procedure that Alice generates signature authorises is as follows:
(2.3a) Alice selects integer t at random 0, the hash value of calculating chameleon hash (hash) function: H wherein 2(w, r 1) be to be input as w||r 1Hash function, operation is appended in symbol " || " expression, namely r 1Append after w; Again with hash value h 2The certificate of entrustment w that generates with Alice is as part territory hash function H 1Input, calculating section territory hash value h w=H 1(h 2, w);
(Partial-Domain Hash, PDH) size that refers to the hash function is a factor of modulus to so-called part territory hash function.Part territory hash function H among the present invention 1: { 0,1} *→ [h 1, h' 1) and
Figure BDA00003133921600049
Can be based on the consequence devised of Gentry, the distortion of the proposition of Gentry sees for details: C.Gentry.How to compress Rabin ciphertexts and signatures.In:Advances in Cryptology Crypto2004, LNCS3152, Springer-Verlag, 2004:179-200.
(2.3b) Alice calculates the Jacobi symbol, determines parameter a by the Jacobi symbol 0And b 0Value:
Figure BDA00003133921600051
Figure BDA00003133921600052
(2.3c) Alice utilizes the private key (p of oneself 0, q 0) to part territory hash value h wSign, obtain the signature value:
s 0 ≡ ( 2 - a 0 h w ) n 0 - p 0 - q 0 + 5 8 mod n 0
(2.3d) Alice by safe lane with its signature authorises (w, t 0, s 0, a 0, b 0) send to allograph people Bob.
(2.4) Bob receives signature authorises (w, the t of Alice 0, s 0, a 0, b 0) after, at first utilize certificate of entrustment w to calculate the hash value of chameleon hash function again
Figure BDA00003133921600054
, with the hash value
Figure BDA00003133921600055
With certificate of entrustment w as part territory hash function H 1Input, calculating section territory hash value h w * = h 1 ( h 2 * , w ) , formula is verified in check then s 0 2 ≡ 2 - a 0 2 h w * ( - 1 ) b 0 mod n 0 Whether set up, if the checking formula is set up, represent that then signature authorises is effective, enter process 3; Otherwise signature authorises is invalid.
Process 3, Bob generates allograph
Allograph people Bob verifies at first whether message m meets certificate of entrustment w, if do not meet, then stops, otherwise utilizes message m, the private key (p of oneself 1, q 1) and certificate of entrustment w calculate the allograph σ=(a of message m based on the collision of chameleon hash function 0, b 0, s 0, r 2, t 1).Last Bob sends to the verifier to certificate of entrustment w and allograph σ.With reference to Fig. 3, the specific implementation process that generates allograph σ is as follows:
(3.1) Bob at first checks message m whether to meet certificate of entrustment w, if do not meet, then exports engineering noise and termination; Otherwise, enter step (3.2);
(3.2) Bob selects random value
Figure BDA00003133921600058
With temporary private k 1Be updated to k 2, and calculate new interim PKI r 2 ≡ g k 2 mod n 1 ;
(3.3) Bob generates message m random number corresponding t based on the collision of the chameleon hash functional value of certificate of entrustment w and message m 1:
t 1 ≡ t 0 + ( k 2 - k 1 ) + 2 λ ( n 1 ) ( H 2 ( w , r 1 ) - H 3 ( m , r 2 ) ) mod λ ( n 1 ) ,
Wherein, t 0In step (2.3a), the integer that Alice selects at random, λ (n 1) be the Ka Mixieer function, by (the p of Bob 1, q 1) determine H 2(w, r 1) refer to be input as message w and interim PKI r 1General hash function, H 3(m, r 2) refer to be input as m||r 2Hash function;
(3.4) allograph of message m under certificate of entrustment w is σ=(a 0, b 0, s 0, r 2, t 1).
Process 4, the verifier verifies the validity of allograph σ
The verifier receives allograph σ=(a of Bob 0, b 0, s 0, r 2, t 1) after, whether surveying agent's signature sigma is the effective allograph of message m under certificate of entrustment w.With reference to Fig. 3, being implemented as follows of this process:
(4.1) verifier at first checks message m whether to meet certificate of entrustment w, if do not meet, then exports engineering noise and termination; Otherwise, enter step (4.2);
(4.2) verifier utilizes allograph σ to calculate chameleon hash function
Figure BDA00003133921600061
With the hash value With certificate of entrustment w as part territory hash function H 1Input, calculating section territory hash value
Figure BDA00003133921600063
(4.3) verifier checks the checking formula
Figure BDA00003133921600064
Whether set up, if set up, represent that then allograph is effective; Otherwise allograph is invalid.
The present invention is not limited to aforesaid embodiment.The present invention expands to any new feature or any new combination that discloses in this manual, and the arbitrary new method that discloses or step or any new combination of process.

Claims (7)

1. the new allograph method based on the integer resolution problem is characterized in that, comprises the following steps:
Step 1: generate original signature people's private key, PKI, allograph people's private key, PKI;
Step 2: the allograph people generates interim PKI r according to its private key, PKI 1, and send to the original signature people;
Step 3: original signature people receives interim PKI r 1After, at first generate certificate of entrustment w, select integer t more at random 0, based on the cryptographic Hash h of the certificate of entrustment w calculating chameleon hash function that generates 2, and to described cryptographic Hash h 2Carry out digital signature, obtain certificate of entrustment w signature; And by safe lane signature authorises being sent to the allograph people, described signature authorises comprises certificate of entrustment w, certificate of entrustment signature, integer t 0
Step 4: the allograph people carries out validation verification to the signature authorises of receiving, if effectively, then execution in step 5;
Step 5: the allograph people verifies whether the allograph message m meets certificate of entrustment w, if, then:
Private key, PKI according to the allograph people generate interim PKI r 2
According to described interim PKI r 2, generate message m random number corresponding t based on the collision of chameleon hash function 1, the collision of described chameleon hash function is: the chameleon hash functional value of certificate of entrustment w, integer t0 and message m, random number t 1The chameleon hash functional value equate, be cryptographic Hash h 2
By certificate of entrustment signature, interim PKI r 2, random number t 1Constitute the allograph of message m under certificate of entrustment w.
2. the method for claim 1 is characterized in that, in the described step 1,
Select the p that satisfies condition at random according to security parameter k 0≡ 3mod8, q 0The prime number p of ≡ 7mod8 0, q 0As original signature people's private key, and with p 0, q 0Product n 0As original signature people PKI.
3. method as claimed in claim 1 or 2 is characterized in that, in the described step 1,
Select two prime number p at random according to security parameter k 1, q 1Private key for the allograph people;
Get described p 1, q 1Product be n 1, select the multiplication group of integers
Figure FDA00003133921500011
On an integer λ (n 1) the element g on rank, described λ ( n 1 ) = 2 p 1 * q 1 * , Integer p 1 * = p 1 - 1 2 , q 1 * = q 1 - 1 2 , Then with described n 1, g is as allograph people's PKI.
4. method as claimed in claim 3 is characterized in that, in the described step 2, the allograph people is from the addition group of integers
Figure FDA00003133921500015
The middle random number k of selecting 1As temporary private, and calculate interim PKI
Figure FDA00003133921500016
5. method as claimed in claim 3 is characterized in that, in the step 3, obtains described certificate of entrustment w signature and comprises the following steps:
Original signature people is according to integer t 0, the cryptographic Hash of calculating chameleon hash function , H wherein 2(w, r 1) be to be input as w||r 1Hash function, operation is appended in symbol " || " expression; Again with cryptographic Hash h 2With certificate of entrustment w as part territory hash function H 0Input, obtain part territory cryptographic Hash h w=H 1(h 2, w);
Original signature people determines parameter a based on the Jacobi symbol 0And b 0Value:
Figure FDA00003133921500021
Original signature people is based on its private key (p 0, q 0) to part territory cryptographic Hash h wSign, obtain signature value s 0: s 0 ≡ ( 2 - a 0 h w ) n 0 - p 0 - q 0 + 5 8 mod n 0 ;
By parameter a 0, b 0, s 0Constitute described certificate of entrustment w signature;
In the then described step 4, validation verification is:
The allograph people calculates the cryptographic Hash of chameleon hash function again based on certificate of entrustment w
Figure FDA00003133921500024
With described cryptographic Hash
Figure FDA00003133921500025
With certificate of entrustment w as part territory hash function H 1Input, calculating section territory cryptographic Hash h h * = H 1 ( h 2 * , w ) , By check checking formula s 0 2 ≡ 2 - a 0 2 h w * ( - 1 ) b 0 mod n 0 Whether become Rob Roy to finish validation verification;
In described step 5, generate message m random number corresponding t 1Be specially:
The allograph people selects random number
Figure FDA00003133921500028
With temporary private k 1Be updated to k 2, generate new interim PKI r 2 ≡ g k 2 mod n 1 , Random number t then 1For:
t 1 ≡ t 0 + ( k 2 - k 1 ) + 2 λ ( n 1 ) ( H 2 ( w , r 1 ) - H 3 ( m , r 2 ) ) mod λ ( n 1 ) ,
H wherein 3(m, r 2) be to be input as m||r 2Hash function.
6. based on the signature verification method of the allograph method of claim 1, it is characterized in that, comprise the following steps:
Whether the checking message m meets certificate of entrustment w, if not, then stops; Otherwise,
Based on certificate of entrustment w, allograph, and whether allograph people's PKI, original signature people's PKI surveying agent signature is effective.
7. based on the signature verification method of the allograph method of claim 6, it is characterized in that, comprise the following steps:
Step S1: whether the check message m meets certificate of entrustment w, if then stop; Otherwise, execution in step S2;
Step S2: according to the random number t of the chameleon hash function in message m, the allograph 1, and allograph people's PKI n 1, g, interim PKI r 2Calculate the chameleon hash function
Figure FDA000031339215000211
With described cryptographic Hash
Figure FDA000031339215000212
With certificate of entrustment w as part territory hash function H 1Input, calculating section territory cryptographic Hash
Figure FDA000031339215000213
Again based on original signature people's PKI n 0And allograph, check checking formula
Figure FDA00003133921500031
Whether set up, if represent that then allograph is effective; Otherwise allograph is invalid.
CN201310157442.2A 2013-05-02 2013-05-02 A kind of new allograph based on Integer Decomposition problem and verification method Expired - Fee Related CN103259662B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310157442.2A CN103259662B (en) 2013-05-02 2013-05-02 A kind of new allograph based on Integer Decomposition problem and verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310157442.2A CN103259662B (en) 2013-05-02 2013-05-02 A kind of new allograph based on Integer Decomposition problem and verification method

Publications (2)

Publication Number Publication Date
CN103259662A true CN103259662A (en) 2013-08-21
CN103259662B CN103259662B (en) 2016-08-10

Family

ID=48963379

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310157442.2A Expired - Fee Related CN103259662B (en) 2013-05-02 2013-05-02 A kind of new allograph based on Integer Decomposition problem and verification method

Country Status (1)

Country Link
CN (1) CN103259662B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103475487A (en) * 2013-09-22 2013-12-25 国家电网公司 Electronic check generating and verifying method based on chameleon hash function
CN103825739A (en) * 2014-01-14 2014-05-28 西安电子科技大学 Authorization revocable directed proxy signature method
WO2015035861A1 (en) * 2013-09-16 2015-03-19 华为终端有限公司 Certificateless multi-agent signature method and apparatus
CN106296184A (en) * 2015-06-05 2017-01-04 地气股份有限公司 Electronic money management method and electronic-monetary system
CN103825882B (en) * 2014-01-14 2017-04-26 西安电子科技大学 High non-camouflage realization method of revocable proxy signature
CN108200108A (en) * 2018-04-11 2018-06-22 吕航宇 A kind of rivest, shamir, adelman and its application
CN110086599A (en) * 2019-04-24 2019-08-02 电子科技大学 Hash calculation method and label decryption method based on homomorphism chameleon hash function
CN110086631A (en) * 2019-04-29 2019-08-02 电子科技大学 A kind of method of renewable chameleon hash function
CN110175473A (en) * 2019-05-22 2019-08-27 西安电子科技大学 Digital signature method based on difficult problem on lattice
CN111294379A (en) * 2018-12-10 2020-06-16 北京沃东天骏信息技术有限公司 Block chain network service platform, authority hosting method thereof and storage medium
CN111556020A (en) * 2020-03-27 2020-08-18 江苏大学 NDN access control method based on interest package signature edge verification
CN112703702A (en) * 2018-06-15 2021-04-23 艾欧特可有限公司 Distributed authentication
CN114329618A (en) * 2021-09-24 2022-04-12 江苏海洋大学 Proxy signature method based on Mambo
CN117094012A (en) * 2023-08-21 2023-11-21 中胜信用管理有限公司 Intelligent verification method and system for electronic authorization order

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051901A (en) * 2006-06-15 2007-10-10 上海交通大学 Method and system for agent signature
US20080126801A1 (en) * 2006-11-29 2008-05-29 Samsung Electronics Co., Ltd Method and apparatus for generating proxy-signature on right object and issuing proxy signature certificate
KR20120065818A (en) * 2010-12-13 2012-06-21 한국전자통신연구원 Identity-based proxy signature from lattices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051901A (en) * 2006-06-15 2007-10-10 上海交通大学 Method and system for agent signature
US20080126801A1 (en) * 2006-11-29 2008-05-29 Samsung Electronics Co., Ltd Method and apparatus for generating proxy-signature on right object and issuing proxy signature certificate
KR20120065818A (en) * 2010-12-13 2012-06-21 한국전자통신연구원 Identity-based proxy signature from lattices

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
FANGGUO ZHANG等: "An Efficient Signature Scheme from Bilinear Pairings and Its Applications", 《7TH INTERNATIONAL WORKSHOP ON THEORY AND PRACTICE IN PUBLIC KEY CRYPTOGRAPHY》 *
周孟创等: "一种前向安全的定向代理签名方案", 《计算机工程》 *
夏琦等: "对一种代理签名方案的密码学分析和改进", 《计算机应用》 *

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015035861A1 (en) * 2013-09-16 2015-03-19 华为终端有限公司 Certificateless multi-agent signature method and apparatus
CN104468476A (en) * 2013-09-16 2015-03-25 华为终端有限公司 Method and device for certificateless multi-proxy signature
US9641340B2 (en) 2013-09-16 2017-05-02 Huawei Device Co., Ltd. Certificateless multi-proxy signature method and apparatus
CN104468476B (en) * 2013-09-16 2017-12-05 华为终端(东莞)有限公司 Method and apparatus without certificate multi-proxy signature
CN103475487A (en) * 2013-09-22 2013-12-25 国家电网公司 Electronic check generating and verifying method based on chameleon hash function
CN103825739A (en) * 2014-01-14 2014-05-28 西安电子科技大学 Authorization revocable directed proxy signature method
CN103825739B (en) * 2014-01-14 2017-03-22 西安电子科技大学 Authorization revocable directed proxy signature method
CN103825882B (en) * 2014-01-14 2017-04-26 西安电子科技大学 High non-camouflage realization method of revocable proxy signature
CN106296184A (en) * 2015-06-05 2017-01-04 地气股份有限公司 Electronic money management method and electronic-monetary system
CN108200108B (en) * 2018-04-11 2021-02-05 吕航宇 Asymmetric encryption algorithm and application thereof
CN108200108A (en) * 2018-04-11 2018-06-22 吕航宇 A kind of rivest, shamir, adelman and its application
CN112703702A (en) * 2018-06-15 2021-04-23 艾欧特可有限公司 Distributed authentication
CN111294379A (en) * 2018-12-10 2020-06-16 北京沃东天骏信息技术有限公司 Block chain network service platform, authority hosting method thereof and storage medium
CN111294379B (en) * 2018-12-10 2022-06-07 北京沃东天骏信息技术有限公司 Block chain network service platform, authority hosting method thereof and storage medium
CN110086599A (en) * 2019-04-24 2019-08-02 电子科技大学 Hash calculation method and label decryption method based on homomorphism chameleon hash function
CN110086631A (en) * 2019-04-29 2019-08-02 电子科技大学 A kind of method of renewable chameleon hash function
CN110175473A (en) * 2019-05-22 2019-08-27 西安电子科技大学 Digital signature method based on difficult problem on lattice
CN110175473B (en) * 2019-05-22 2022-12-27 西安电子科技大学 Digital signature method based on lattice difficulty problem
CN111556020A (en) * 2020-03-27 2020-08-18 江苏大学 NDN access control method based on interest package signature edge verification
CN111556020B (en) * 2020-03-27 2022-09-16 江苏大学 NDN access control method based on interest package signature edge verification
CN114329618A (en) * 2021-09-24 2022-04-12 江苏海洋大学 Proxy signature method based on Mambo
CN117094012A (en) * 2023-08-21 2023-11-21 中胜信用管理有限公司 Intelligent verification method and system for electronic authorization order
CN117094012B (en) * 2023-08-21 2024-04-30 中胜信用管理有限公司 Intelligent verification method and system for electronic authorization order

Also Published As

Publication number Publication date
CN103259662B (en) 2016-08-10

Similar Documents

Publication Publication Date Title
CN103259662A (en) Novel procuration signature and verification method based on integer factorization problems
Zhu et al. A secure and efficient data integrity verification scheme for cloud-IoT based on short signature
Shen et al. Secure real-time traffic data aggregation with batch verification for vehicular cloud in VANETs
CN102983971B (en) Certificateless signature algorithm for user identity authentication in network environment
CN103023648B (en) Based on elliptic curves discrete logarithm problem without certificate signature method
Islam et al. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings
CN104023044A (en) Cloud-storage data lightweight-level public auditing method with privacy protection
CN102957536B (en) Based on the certificate verification system CFL of mark
CN103117860B (en) Without the blind ring signatures method of certificate
CN112532394B (en) Block chain anti-signature traceable certificateless blind signature generation method
Kim et al. Device authentication protocol for smart grid systems using homomorphic hash
CN104038493B (en) Bilinear pairing-free cloud storage data security audit method
CN102883321A (en) Digital signature authentication method facing mobile widget
CN103095697A (en) Multiple signature generation and verification system and method thereof
Liu et al. An efficient double parameter elliptic curve digital signature algorithm for blockchain
Huqing et al. Research on zero-knowledge proof protocol
CN103634788A (en) Certificateless multi-proxy signcryption method with forward secrecy
CN116346328A (en) Digital signature method, system, equipment and computer readable storage medium
Zhou et al. An efficient identity authentication scheme with dynamic anonymity for VANETs
Wu et al. Cryptanalysis and improvement of a new certificateless signature scheme in the standard model
Qiao et al. An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET
Wang et al. Server-aided verification proxy re-signature
Zhang et al. Provably secure and subliminal-free variant of schnorr signature
Hu et al. An improved efficient identity-based proxy signature in the standard model
Zhang et al. Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160810

Termination date: 20200502

CF01 Termination of patent right due to non-payment of annual fee