CN100437611C - Authorization controlled electronic signature method based on elliptical curve - Google Patents

Authorization controlled electronic signature method based on elliptical curve Download PDF

Info

Publication number
CN100437611C
CN100437611C CNB2005100192144A CN200510019214A CN100437611C CN 100437611 C CN100437611 C CN 100437611C CN B2005100192144 A CNB2005100192144 A CN B2005100192144A CN 200510019214 A CN200510019214 A CN 200510019214A CN 100437611 C CN100437611 C CN 100437611C
Authority
CN
China
Prior art keywords
procurator
electronic signature
signature
authorization
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005100192144A
Other languages
Chinese (zh)
Other versions
CN1737721A (en
Inventor
周祖德
肖攸安
李方敏
刘泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University of Technology WUT
Original Assignee
Wuhan University of Technology WUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University of Technology WUT filed Critical Wuhan University of Technology WUT
Priority to CNB2005100192144A priority Critical patent/CN100437611C/en
Publication of CN1737721A publication Critical patent/CN1737721A/en
Application granted granted Critical
Publication of CN100437611C publication Critical patent/CN100437611C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention relates to an authorization controlled electronic signature method based on an elliptical curve. The method comprises the specific steps: system parameters are determined on the basis of the elliptical curve; a client carries out delegation authorization; an agent verifies a delegation request; the agent uses electronic signature right; a receiver verifies the received data message. The method realizes safe and reliable delegation authorization for the electronic signature right. The client strictly controls delegation authorization electronic signature behaviors, such as the limitation of the signature range used by the agent, the time limitation setting of the delegation authorization, the limitation of the maximum signature frequency, etc.

Description

A kind of authorization controlled electronic signature method based on elliptic curve
Technical field
The invention belongs to electric endorsement method in the filed of network information security, particularly a kind of authorization controlled electronic signature method based on elliptic curve.
Background technology
In the every field relevant with information such as e-commerce system, electronic government affairs system, information safety system, network communicating system, electronic signature technology is one of extremely basic technology.It has simulated the function of real-life handwritten signature, not only have abilities such as authentication, source discriminating, resisting denying, anti-forgery, and can also carry out integrated authentication to the data text, and can guarantee authenticity, security, reliability and the legitimacy of electronic message, thereby has very significant meaning for the normal operation of guarantee information system.In many countries, comprise China, electronic signature has all obtained jurally admitting.
At present, effort through the lot of domestic and foreign scholar, many electric endorsement methods have appearred, for example: the application number that Patent Office of the People's Republic of China announces is that 02153672.4 patented claim " a kind of signing and word-leaving method of utilizing wireless pen " discloses a kind of by the written handwriting of record user when utilizing wireless pen to carry out handwritten signature, with its method as document signature, but because this signature only is the simple simulation of handwritten signature, do not have direct relation with document content, therefore can't realize the 5th of China's Electronic Signature Law and the 13 defined integrality at all, resisting denying, anti-forgery waits the basic demand about the electronic signature legitimacy.Application number is that 01139001.8 patented claim " method for anti-counterfeit of electronic signature and device " then discloses a kind of electronic signature method for anti-counterfeit that is applied to bar code system, and applicable surface is narrower.
But all these methods all can not solve the delegable problem of electronic signature right.
In real world, people often need give reliable procurator with some the signature assignable of authority of oneself, allow the procurator represent and go to exercise these power in person.Entrust the classic method of signature power to be to use seal, because seal can transmit between people neatly.And in the electronic signature field, also be badly in need of a kind of method, realizing a kind of function that is similar to real-life seal and official seal, so that with oneself electronic signature right through committing others's method.As application number is that 03123791.6 patented claim " a kind of method of electronic document being carried out signature authentication with electronic seal " utilizes by the signature official seal and prints the electronic seal that official seal is formed, distribute by movable storage device and safe channel, realize the function of authorization electronic signature, but this method not only exists the danger in the distribution procedure, can't realize control to the use of signature power, and only can be applicable to the electronic government documents field, range of application is very narrow.Application number is that 200410052864.4 the patented claim method of delegable Electronic Signature safety " the stamped signature centralized management with " power of then will sign is all entrusted to believable OA system realize the signing delegable of power and operated, OA system during this method pin, take stamped signature centralized management system, the operation of realization delegable, therefore only can be applied to credible OA system, application surface is very narrow.Numerous safety issue such as in addition, this method exists also that signature can be forged, the integrality of document can't guarantee, the procurator signs power is uncontrollable, clientage and procurator can deny mutually.
Used relational language is described as follows in the instructions of the present invention:
According to the definition of the Electronic Signature Law of China, so-called electronic signature is meant in the electronic message to be used to discern signer's identity and to show that the signer approves the wherein data of content so that electronic form is contained, appended.And electronic message then is meant the information that generates, sends, receives or store with electronics, optics, electromagnetism or similar means.
The clientage refers to the signer who has original electronic signature power, and he can be as required, and oneself electronic signature assignable of authority is licensed to another signer, i.e. procurator.
The procurator refers to the delegable according to the clientage, exercises the signer of actual electronic signature power.
Authorization electronic signature refers to the delegable of procurator according to the clientage, the electronic signature that the delegate people generates.
The recipient refers to the user who receives electronic message.
The digital certificate service organization that the third party that authentication center refers to is that set up according to the 17 of Electronic Signature Law, all approved by the parties is believable, provide the associated electrical authentication service, it can provide and meet Electronic Signature Law twenty-one provision defined electronic signature certificate.
The time stamp certificate refers to the electronic signature certificate that contained electronics document is provided time-proven.
Summary of the invention
The objective of the invention is to deficiency at prior art and method, a kind of difficulty of finding the solution based on the elliptic curve discrete logarithm problem on the Galois field is provided, and by the safe and reliable authorization controlled electronic signature method based on elliptic curve of believable third party's digital certificate service organization.This method can make the clientage that scope of authority, signature time and signature number of times that the procurator exercises electronic signature power are controlled reliably.
To achieve these goals, concrete steps of the present invention are:
First step: determine systematic parameter;
Definite method of systematic parameter is: for selected big integer p, and elliptic curve E (GF (p)): y 2=x 3+ ax+b (mod p) is a safety elliptic curve that is defined on the Galois field GG (p), and basic point of picked at random is G on it, and establishing n=#E (GF (p)) is the rank of elliptic curve E, and r is the big prime factor of n.And the private key of establishing the clientage is SK A, procuratorial private key is SK B, both are the positive integer at random less than r-1.
Then clientage's PKI is PK A=SK A* G, procuratorial PKI are PK B=SK B* G.
Second step: the clientage carries out the delegable process;
When the clientage because of certain reason, when needing the delegable procurator to sign electronically power, carry out following operation:
1. the clientage generates the power of attorney A that is used to limit procuratorial signature authority p, extent of competence, the procurator's delegate people who exercises electronic signature power comprising digital certificates, the valid period of delegable, procurator's delegate people of the authentication center of agreement, the explanation of relevant procurator's identity exercises the contents such as maximum signature number of times of electronic signature power.
2. the clientage utilizes the private key SK of oneself A, to limiting the power of attorney A of procuratorial signature authority pCarry out the ordinary electronic signature, obtain being used to limit the certificate of authority C of procuratorial signature authority p
3. the clientage is with certificate of authority C pSend to the CA of authentication center.
4. the CA of authentication center sets the maximum signature number of times that procurator's delegate people exercises electronic signature power according to the certificate of authority in internal database on the basis that has authenticated the certificate of authority legitimacy of being received.
5. positive integer k less than r-1 of clientage's picked at random is calculated and is entrusted parameter Q p=k * G.
6. clientage's hash digest algorithm according to a preconcerted arrangement calculates hash digest value H p=Hash (C P, Q p).
7. the clientage is according to the private key SK of oneself A, calculate authorization parameter S p=H p* SK A+ k.
8. the clientage generates delegable information M according to entrusting parameter and authorization parameter p=(S p, Q p).
9. the clientage is with certificate of authority C pWith delegable information M pAs entrusting request (C p, M P), send to the procurator.
Third step: the procurator verifies the process of entrusting request;
The procurator carries out following operation after receiving clientage's trust request, and the legitimacy of request is entrusted in checking, and whether decision is accepted commission:
1. the procurator separates out certificate of authority C from entrust request p, utilize clientage's PKI PK A, the legitimacy of the checking certificate of authority; If certificate of authority C pBe effectively, then carry out 2. step of this step the; Otherwise if certificate of authority C pBe invalid, then require the clientage to resend and entrust request, perhaps directly refuse this trust request.
2. the procurator is from certificate of authority C pIn separate out power of attorney A p, and according to power of attorney A pContent, whether accept commission people's trust request of decision.People's the trust request if accept commission is then carried out 3. step of this step the, if the people's that do not accept commission request is then directly refused this trusts and asked.
3. the procurator separates out delegable information M from entrust request p
4. the procurator is from delegable information M pIn separate out and entrust parameter Q pWith authorization parameter S p
5. procurator's hash digest algorithm according to a preconcerted arrangement calculates hash digest value H p=Hash (C P, Q p).
6. the procurator verifies equation S P* G=Q P+ H P* PK AWhether set up.If equation is false, illustrate that then this delegable information is invalid, should require the clientage to resend and entrust request.If equation is set up, illustrate that then this delegable information is effectively, is accepted.And exercise electronic signature power according to scope of authority delegate people.
The 4th step: the procurator exercises the process of electronic signature power;
When the delegate people exercises electronic signature power in the procurator need the agent authority of power at oneself, carry out following operation:
1. the procurator is according to the delegable information M from being received pIn the authorization parameter S that separates out p, and the procurator calculates resulting hash digest value H p, calculate authorization electronic signature private key SK p=S p+ SK B* H P
2. the procurator utilizes the authorization electronic signature private key SK that is generated pWith the delegable information M that is received p, ordinary electronic endorsement method by appointment, the electronics document M that needs are signed carries out the ordinary electronic signature, can get ordinary electronic signature S '=Sig (SK p, M, M p), then authorization electronic signature be S=(S ', Q p).
3. the procurator generates the request authentication document, comprising: procuratorial identity information, this step the authentication message that 2. resulting authorization electronic signature S and request are notarized to the electronic signature of being signed in the step.
4. the procurator utilizes the private key SK of oneself BSignature request authentication document obtains the request authentication text.
5. the procurator sends to the CA of authentication center, request authentication with the request authentication text.
6. the CA of authentication center confirms the integrality and the authenticity of this text after receiving the request authentication text that the procurator submits to.If wrong, then refusal provides authentication service, and requires the procurator to resend.If authentication is passed through, carry out the 7. step operation of this step.
7. the CA of authentication center searches for the maximum signature number of times of being set by the clientage in internal database, and the procurator the delegate people exercise the electronic signature power the signature number of times, if in the scope of the maximum of delegable signature number of times, then, the authorization electronic signature in the request authentication text of being received is signed and issued time stamp certificate T according to the time of receiving the request authentication text P, revise the signature number of times information in the internal database simultaneously; Otherwise, provide authentication service with refusal, and terminating operation.
8. the CA of authentication center is with the time stamp certificate T that is signed PReturn to the procurator.
9. the procurator is at the time stamp certificate T that receives by authentication center's signature PAfterwards, this certificate is attached to after the message, the time-proven of the authorization electronic signature of the electronics document being signed as its delegate people is with electronics document M, authorization electronic signature S, certificate of authority C pTogether, form electronic message (M, S, C P, T P).
The 5th step: the process of the electronic message that recipient's checking is received
Need be received in check as the recipient, during by the legitimacy of the electronic message of procurator's delegate people signature, carry out following operation:
1. the recipient separates out electronics document M, authorization electronic signature S, certificate of authority C from the electronic message of being received pWith time stamp certificate T P
2. the recipient utilizes clientage's PKI PK A, the legitimacy of the checking certificate of authority.Utilize the PKI of authentication center, checking time stamp certificate T PLegitimacy.If checking is not passed through, illustrate that then this electronic message is invalid.
3. the recipient is according to certificate of authority C pAnd time stamp certificate T P, check whether the procurator has the right to sign this electronics document, i.e. the authorization electronic signature behavior of whether in the maximum signature number of times of the mandate timeliness of the signature scope that limits, qualification, restriction, carrying out.If check and do not pass through, illustrate that then this electronic message is invalid.
4. the recipient separates out from authorization electronic signature S and entrusts parameter Q p
5. recipient's hash digest algorithm according to a preconcerted arrangement calculates hash digest value H p=Hash (C p, Q p).
6. the recipient is according to authorization electronic signature S, and clientage's PKI PK AWith procuratorial PKI PK B, calculate authorization electronic signature PKI PK P=Q P+ H P* (PK A+ PK B).
7. the recipient is according to the ordinary electronic endorsement method that uses of arrange, and checking is by the legitimacy of the electronic message of procurator's delegate people signature, promptly function Ver (S ', PK p, whether be true M).If value is for true, then this authorization electronic signature is legal; Otherwise then this authorization electronic signature is illegal.
The present invention compares with various electric endorsement methods before, and the present invention can realize electronic signature power is carried out safe and reliable delegable.The clientage can strictly control and comprise that the restriction procurator exercises the delegable electronic signature behavior of the timeliness of the scope of signature, setting delegable, the maximum signature of restriction number of times etc.This method not only meets the Electronic Signature Law defined to the integrality, resisting denying of electronic signature, anti-basic demand of forging etc. about the electronic signature legitimacy, and possesses very strong unforgeable, well outstanding character such as identity and very strong non-repudiation and the ability that prevents procurator's abuse of the power of agency power.
In addition, this method also possesses higher execution efficient, be easy to management, can resist various known attack methods, security is very high, authenticity, security, reliability and the legitimacy of electronic message can be guaranteed, various hardware environments such as computing machine, communication network, smart card, mobile phone can be widely used in, and every field such as e-commerce system, electronic government affairs system, information safety system, network communicating system.
Description of drawings
Accompanying drawing is the process flow diagram of authorization controlled electronic signature of the present invention.
Embodiment
The invention will be further described below in conjunction with embodiment, but this embodiment should not be construed as limitation of the present invention.
Selected at random 192 big prime number p, elliptic curve E (GF (p)): y 2=x 3+ ax+b (mod p) is a safety elliptic curve that is defined on the finite field gf (p), on it basic point of picked at random be G=(x, y), the rank of elliptic curve E are n=#E (GF (p)), r is the big prime factor of n.
Wherein,
p=6277101735386680763835789423207666416083908700390324961279
a=592616546630905635115220920655548752905575269097021663719
b=4804233895280899388319973107961190048453702796229268188014
n=165186887773333704311468142720121385129365739211127201127
r=165186887773333704311468142720121385129365739211127201127
x=767497456867608967492675205059054232203172713727662547906
y=773339505718536040565224929606618157393578012863049959916
If clientage's private key is SK A, procuratorial private key is SK B, both are the positive integer at random less than r-1, and then clientage's PKI is PK A=SK A* G, procuratorial PKI are PK B=SK B* G.
System agreement is used the hash digest algorithm of SHA-256 algorithm as agreement, and the EC-E1Gama1 algorithm is as the ordinary electronic signature algorithm, and operates by the step in the summary of the invention, can finish the flow process of authorization electronic signature.
Clearly, the present invention is not limited to the foregoing description, but can change under the situation that does not break away from invention scope and thought and revise.
The content that this instructions is not described in detail belongs to and well known to a person skilled in the art prior art.

Claims (1)

1, a kind of authorization controlled electronic signature method based on elliptic curve, its concrete steps are:
First step: determine systematic parameter, definite method of systematic parameter is: selected big integer p, elliptic curve E (GF (p)): y 2=x 3+ ax+b (modp) is a safety elliptic curve that is defined on the finite field gf (p), and basic point of picked at random is G on it, and when n=#E (GF (p)) is the rank of elliptic curve E, r is the big prime factor of n, when clientage's private key is SK A, procuratorial private key is SK B, both are the positive integer at random less than r-1, and then clientage's PKI is PK A=SK A* G, procuratorial PKI are PK B=SK B* G;
Second step: the clientage carries out delegable, and its process is:
1. the clientage generates the power of attorney A that is used to limit procuratorial signature authority p, exercise the maximum signature number of times that extent of competence, procurator's delegate people of electronic signature power exercise electronic signature power comprising digital certificates, the valid period of delegable, procurator's delegate people of the authentication center of agreement, the explanation of relevant procurator's identity;
2. the clientage utilizes the private key SK of oneself A, to limiting the power of attorney A of procuratorial signature authority pCarry out the ordinary electronic signature, obtain being used to limit the certificate of authority C of procuratorial signature authority p
3. the clientage is with certificate of authority C pSend to the CA of authentication center;
4. the CA of authentication center sets the maximum signature number of times that procurator's delegate people exercises electronic signature power according to the certificate of authority in internal database on the basis that has authenticated the certificate of authority legitimacy of being received;
5. positive integer k less than r-1 of clientage's picked at random is calculated and is entrusted parameter Q p=k * G;
6. clientage's hash digest algorithm according to a preconcerted arrangement calculates hash digest value H p=Hash (C P, Q p);
7. the clientage is according to the private key SK of oneself A, calculate authorization parameter S p=H p* SK A+ k;
8. the clientage generates delegable information M according to entrusting parameter and authorization parameter p=(S p, Q p);
9. the clientage is with certificate of authority C pWith delegable information M pAs entrusting request (C p, M P), send to the procurator;
Third step: the procurator verifies and entrusts request that its process is:
1. the procurator separates out certificate of authority C from entrust request p, utilize clientage's PKI PK A, if the legitimacy of the checking certificate of authority is certificate of authority C pBe effectively, then carry out the 2. step of this step, entrust request, perhaps directly refuse this trusts to ask otherwise require the clientage to resend;
2. the procurator is from certificate of authority C pIn separate out power of attorney A p, and according to power of attorney A pContent, whether accept commission people's trust request of decision is if the people's that accepts commission trust request is then carried out 3. step of this step the, if the people's that do not accept commission request is then directly refused this trusts to ask;
3. the procurator separates out delegable information M from entrust request p
4. the procurator is from delegable information M pIn separate out and entrust parameter Q pWith authorization parameter S p
5. procurator's hash digest algorithm according to a preconcerted arrangement calculates hash digest value H p=Hash (C P, Q p);
6. the procurator verifies equation S P* G=Q P+ H P* PK AWhether set up,, illustrate that then this delegable information is invalid if equation is false, should require the clientage to resend and entrust request,, illustrate that then this delegable information is effective if equation is set up, accepted, and exercised electronic signature power according to scope of authority delegate people;
The 4th step: the agency is from exercising electronic signature power, and its process is:
1. the procurator is according to the delegable information M from being received pIn the authorization parameter S that separates out p, and the procurator calculates resulting hash digest value H p, calculate authorization electronic signature private key SK p=S p+ SK B* H P
2. the procurator utilizes the authorization electronic signature private key SK that is generated pWith the delegable information M that is received p, ordinary electronic endorsement method by appointment, the electronics document M that needs are signed carries out the ordinary electronic signature, can get ordinary electronic signature S '=Sig (SK p, M, M p), then authorization electronic signature be S=(S ', Q p);
5. the procurator generates the request authentication document, comprising: procuratorial identity information, this step the authentication message that 2. resulting authorization electronic signature S and request are notarized to the electronic signature of being signed in the step;
4. the procurator utilizes the private key SK of oneself BSignature request authentication document obtains the request authentication text;
5. the procurator sends to the CA of authentication center, request authentication with the request authentication text;
6. the CA of authentication center confirms the integrality and the authenticity of this text after receiving the request authentication text that the procurator submits to, if wrong, then refusal provides authentication service, and requires the procurator to resend, if authentication is passed through, carries out the 7. step operation of this step;
7. the CA of authentication center searches for the maximum signature number of times of being set by the clientage in internal database, and the procurator the delegate people exercise the electronic signature power the signature number of times, if in the scope of the maximum of delegable signature number of times, then, the authorization electronic signature in the request authentication text of being received is signed and issued time stamp certificate T according to the time of receiving the request authentication text P, revise the signature number of times information in the internal database simultaneously, otherwise, provide authentication service with refusal, and terminating operation;
8. the CA of authentication center is with the time stamp certificate T that is signed PReturn to the procurator;
9. the procurator is at the time stamp certificate T that receives by authentication center's signature PAfterwards, this certificate is attached to after the message, the time-proven of the authorization electronic signature of the electronics document being signed as its delegate people is with electronics document M, authorization electronic signature S, certificate of authority C pTogether, form electronic message (M, S, C P, T P);
The 5th step: the electronic message that recipient's checking is received, its process is:
1. the recipient separates out electronics document M, authorization electronic signature S, certificate of authority C from the electronic message of being received pWith time stamp certificate T P
2. the recipient utilizes clientage's PKI PK A, the legitimacy of the checking certificate of authority is utilized the PKI of authentication center, checking time stamp certificate T PLegitimacy, if the checking do not pass through, illustrate that then this electronic message is invalid;
3. the recipient is according to certificate of authority C pAnd time stamp certificate T P, check whether the procurator has the right to sign this electronics document, i.e. the authorization electronic signature behavior of whether carrying out in the maximum signature number of times of the mandate timeliness of the signature scope that limits, qualification, restriction if check and do not pass through, illustrates that then this electronic message is invalid;
4. the recipient separates out from authorization electronic signature S and entrusts parameter Q p
5. recipient's hash digest algorithm according to a preconcerted arrangement calculates hash digest value H p=Hash (C P, Q p);
6. the recipient is according to authorization electronic signature S, and clientage's PKI PK AWith procuratorial PKI PK B, calculate authorization electronic signature PKI PK P=Q P+ H P* (PK A+ PK B);
7. the recipient is according to the ordinary electronic endorsement method that uses of arrange, and checking is by the legitimacy of the electronic message of procurator's delegate people signature, promptly function Ver (S ', PK p, whether be true M), if value is for true, then this authorization electronic signature is legal; Otherwise then this authorization electronic signature is illegal.
CNB2005100192144A 2005-08-03 2005-08-03 Authorization controlled electronic signature method based on elliptical curve Expired - Fee Related CN100437611C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100192144A CN100437611C (en) 2005-08-03 2005-08-03 Authorization controlled electronic signature method based on elliptical curve

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100192144A CN100437611C (en) 2005-08-03 2005-08-03 Authorization controlled electronic signature method based on elliptical curve

Publications (2)

Publication Number Publication Date
CN1737721A CN1737721A (en) 2006-02-22
CN100437611C true CN100437611C (en) 2008-11-26

Family

ID=36080534

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100192144A Expired - Fee Related CN100437611C (en) 2005-08-03 2005-08-03 Authorization controlled electronic signature method based on elliptical curve

Country Status (1)

Country Link
CN (1) CN100437611C (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100518059C (en) * 2006-07-19 2009-07-22 上海交通大学 Quadratic region code producing method and signature method
CN109104396B (en) * 2017-06-21 2021-03-16 上海钜真金融信息服务有限公司 Block chain agent authorization method and medium based on agent signature
CN113935070B (en) 2021-12-16 2022-06-07 北京百度网讯科技有限公司 Data processing method, device and equipment based on block chain and storage medium
CN116318739B (en) * 2023-05-23 2023-08-15 北京中超伟业信息安全技术股份有限公司 Electronic data exchange method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010047563A (en) * 1999-11-22 2001-06-15 이계철 Public key based mutual authentication method in wireless communication system
US20030123656A1 (en) * 2001-12-10 2003-07-03 Fujitsu Limited Elliptic curve cryptosystem apparatus, storage medium storing elliptic curve cryptosystem program, and elliptic curve cryptosystem arithmetic method
KR20030060148A (en) * 2002-01-07 2003-07-16 이임영 A secure piconet organization and maintenance method with using Elliptic Curve Cryptography
US20040022523A1 (en) * 2002-01-18 2004-02-05 Duerr Thomas E. Digital video authenticator
EP1135886B1 (en) * 1998-12-10 2004-03-03 Citibank, N.A. Cryptosystems with elliptic curves chosen by users

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1135886B1 (en) * 1998-12-10 2004-03-03 Citibank, N.A. Cryptosystems with elliptic curves chosen by users
KR20010047563A (en) * 1999-11-22 2001-06-15 이계철 Public key based mutual authentication method in wireless communication system
US20030123656A1 (en) * 2001-12-10 2003-07-03 Fujitsu Limited Elliptic curve cryptosystem apparatus, storage medium storing elliptic curve cryptosystem program, and elliptic curve cryptosystem arithmetic method
KR20030060148A (en) * 2002-01-07 2003-07-16 이임영 A secure piconet organization and maintenance method with using Elliptic Curve Cryptography
US20040022523A1 (en) * 2002-01-18 2004-02-05 Duerr Thomas E. Digital video authenticator

Also Published As

Publication number Publication date
CN1737721A (en) 2006-02-22

Similar Documents

Publication Publication Date Title
CN100571122C (en) A kind of safe and reliable controlled authorization electronic signature method
CN100592684C (en) An efficient authorization electronic signature method without authentication center
US20200304316A1 (en) Implicitly Certified Digital Signatures
CN103259662B (en) A kind of new allograph based on Integer Decomposition problem and verification method
CN102983971B (en) Certificateless signature algorithm for user identity authentication in network environment
CN101136748B (en) Identification authentication method and system
EP2533457B1 (en) Secure implicit certificate chaining
CN103023648B (en) Based on elliptic curves discrete logarithm problem without certificate signature method
CN109818730B (en) Blind signature acquisition method and device and server
CN101931536B (en) Method for encrypting and authenticating efficient data without authentication center
CN108737391B (en) Method for quickly revoking identity of information service entity
CN105376064B (en) A kind of anonymity message authentication system and its message signing method
KR20120007509A (en) Method for authenticating identity and generating share key
CN110022542A (en) A kind of anonymous authentication method of the modified based on condition secret protection
CN107483191A (en) A kind of SM2 algorithm secret keys segmentation signature system and method
CN103347018A (en) Long-distance identity authentication method based on intelligent card and under multiple-service environment
CN1193538C (en) Electronic cipher formation and checking method
CN100437611C (en) Authorization controlled electronic signature method based on elliptical curve
CN105554018A (en) Network real name verification method
CN115238294A (en) Digital RMB transaction privacy protection method, system and device based on mixed currency protocol
CN1581772A (en) System and method for controlling a mobile terminal using a digital signature
CN101931535A (en) Method for adaptively performing data encryption and authentication without authentication center
León-Coca et al. Authentication systems using ID Cards over NFC links: the Spanish experience using DNIe
CN101262344B (en) An efficient quick authorization electronic signature method
CN107040923A (en) The authentication method and device of a kind of wearable device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20081126

Termination date: 20110803