CN100437611C - Authorization controlled electronic signature method based on elliptical curve - Google Patents
Authorization controlled electronic signature method based on elliptical curve Download PDFInfo
- Publication number
- CN100437611C CN100437611C CNB2005100192144A CN200510019214A CN100437611C CN 100437611 C CN100437611 C CN 100437611C CN B2005100192144 A CNB2005100192144 A CN B2005100192144A CN 200510019214 A CN200510019214 A CN 200510019214A CN 100437611 C CN100437611 C CN 100437611C
- Authority
- CN
- China
- Prior art keywords
- procurator
- electronic signature
- signature
- authorization
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The present invention relates to an authorization controlled electronic signature method based on an elliptical curve. The method comprises the specific steps: system parameters are determined on the basis of the elliptical curve; a client carries out delegation authorization; an agent verifies a delegation request; the agent uses electronic signature right; a receiver verifies the received data message. The method realizes safe and reliable delegation authorization for the electronic signature right. The client strictly controls delegation authorization electronic signature behaviors, such as the limitation of the signature range used by the agent, the time limitation setting of the delegation authorization, the limitation of the maximum signature frequency, etc.
Description
Technical field
The invention belongs to electric endorsement method in the filed of network information security, particularly a kind of authorization controlled electronic signature method based on elliptic curve.
Background technology
In the every field relevant with information such as e-commerce system, electronic government affairs system, information safety system, network communicating system, electronic signature technology is one of extremely basic technology.It has simulated the function of real-life handwritten signature, not only have abilities such as authentication, source discriminating, resisting denying, anti-forgery, and can also carry out integrated authentication to the data text, and can guarantee authenticity, security, reliability and the legitimacy of electronic message, thereby has very significant meaning for the normal operation of guarantee information system.In many countries, comprise China, electronic signature has all obtained jurally admitting.
At present, effort through the lot of domestic and foreign scholar, many electric endorsement methods have appearred, for example: the application number that Patent Office of the People's Republic of China announces is that 02153672.4 patented claim " a kind of signing and word-leaving method of utilizing wireless pen " discloses a kind of by the written handwriting of record user when utilizing wireless pen to carry out handwritten signature, with its method as document signature, but because this signature only is the simple simulation of handwritten signature, do not have direct relation with document content, therefore can't realize the 5th of China's Electronic Signature Law and the 13 defined integrality at all, resisting denying, anti-forgery waits the basic demand about the electronic signature legitimacy.Application number is that 01139001.8 patented claim " method for anti-counterfeit of electronic signature and device " then discloses a kind of electronic signature method for anti-counterfeit that is applied to bar code system, and applicable surface is narrower.
But all these methods all can not solve the delegable problem of electronic signature right.
In real world, people often need give reliable procurator with some the signature assignable of authority of oneself, allow the procurator represent and go to exercise these power in person.Entrust the classic method of signature power to be to use seal, because seal can transmit between people neatly.And in the electronic signature field, also be badly in need of a kind of method, realizing a kind of function that is similar to real-life seal and official seal, so that with oneself electronic signature right through committing others's method.As application number is that 03123791.6 patented claim " a kind of method of electronic document being carried out signature authentication with electronic seal " utilizes by the signature official seal and prints the electronic seal that official seal is formed, distribute by movable storage device and safe channel, realize the function of authorization electronic signature, but this method not only exists the danger in the distribution procedure, can't realize control to the use of signature power, and only can be applicable to the electronic government documents field, range of application is very narrow.Application number is that 200410052864.4 the patented claim method of delegable Electronic Signature safety " the stamped signature centralized management with " power of then will sign is all entrusted to believable OA system realize the signing delegable of power and operated, OA system during this method pin, take stamped signature centralized management system, the operation of realization delegable, therefore only can be applied to credible OA system, application surface is very narrow.Numerous safety issue such as in addition, this method exists also that signature can be forged, the integrality of document can't guarantee, the procurator signs power is uncontrollable, clientage and procurator can deny mutually.
Used relational language is described as follows in the instructions of the present invention:
According to the definition of the Electronic Signature Law of China, so-called electronic signature is meant in the electronic message to be used to discern signer's identity and to show that the signer approves the wherein data of content so that electronic form is contained, appended.And electronic message then is meant the information that generates, sends, receives or store with electronics, optics, electromagnetism or similar means.
The clientage refers to the signer who has original electronic signature power, and he can be as required, and oneself electronic signature assignable of authority is licensed to another signer, i.e. procurator.
The procurator refers to the delegable according to the clientage, exercises the signer of actual electronic signature power.
Authorization electronic signature refers to the delegable of procurator according to the clientage, the electronic signature that the delegate people generates.
The recipient refers to the user who receives electronic message.
The digital certificate service organization that the third party that authentication center refers to is that set up according to the 17 of Electronic Signature Law, all approved by the parties is believable, provide the associated electrical authentication service, it can provide and meet Electronic Signature Law twenty-one provision defined electronic signature certificate.
The time stamp certificate refers to the electronic signature certificate that contained electronics document is provided time-proven.
Summary of the invention
The objective of the invention is to deficiency at prior art and method, a kind of difficulty of finding the solution based on the elliptic curve discrete logarithm problem on the Galois field is provided, and by the safe and reliable authorization controlled electronic signature method based on elliptic curve of believable third party's digital certificate service organization.This method can make the clientage that scope of authority, signature time and signature number of times that the procurator exercises electronic signature power are controlled reliably.
To achieve these goals, concrete steps of the present invention are:
First step: determine systematic parameter;
Definite method of systematic parameter is: for selected big integer p, and elliptic curve E (GF (p)): y
2=x
3+ ax+b (mod p) is a safety elliptic curve that is defined on the Galois field GG (p), and basic point of picked at random is G on it, and establishing n=#E (GF (p)) is the rank of elliptic curve E, and r is the big prime factor of n.And the private key of establishing the clientage is SK
A, procuratorial private key is SK
B, both are the positive integer at random less than r-1.
Then clientage's PKI is PK
A=SK
A* G, procuratorial PKI are PK
B=SK
B* G.
Second step: the clientage carries out the delegable process;
When the clientage because of certain reason, when needing the delegable procurator to sign electronically power, carry out following operation:
1. the clientage generates the power of attorney A that is used to limit procuratorial signature authority
p, extent of competence, the procurator's delegate people who exercises electronic signature power comprising digital certificates, the valid period of delegable, procurator's delegate people of the authentication center of agreement, the explanation of relevant procurator's identity exercises the contents such as maximum signature number of times of electronic signature power.
2. the clientage utilizes the private key SK of oneself
A, to limiting the power of attorney A of procuratorial signature authority
pCarry out the ordinary electronic signature, obtain being used to limit the certificate of authority C of procuratorial signature authority
p
3. the clientage is with certificate of authority C
pSend to the CA of authentication center.
4. the CA of authentication center sets the maximum signature number of times that procurator's delegate people exercises electronic signature power according to the certificate of authority in internal database on the basis that has authenticated the certificate of authority legitimacy of being received.
5. positive integer k less than r-1 of clientage's picked at random is calculated and is entrusted parameter Q
p=k * G.
6. clientage's hash digest algorithm according to a preconcerted arrangement calculates hash digest value H
p=Hash (C
P, Q
p).
7. the clientage is according to the private key SK of oneself
A, calculate authorization parameter S
p=H
p* SK
A+ k.
8. the clientage generates delegable information M according to entrusting parameter and authorization parameter
p=(S
p, Q
p).
9. the clientage is with certificate of authority C
pWith delegable information M
pAs entrusting request (C
p, M
P), send to the procurator.
Third step: the procurator verifies the process of entrusting request;
The procurator carries out following operation after receiving clientage's trust request, and the legitimacy of request is entrusted in checking, and whether decision is accepted commission:
1. the procurator separates out certificate of authority C from entrust request
p, utilize clientage's PKI PK
A, the legitimacy of the checking certificate of authority; If certificate of authority C
pBe effectively, then carry out 2. step of this step the; Otherwise if certificate of authority C
pBe invalid, then require the clientage to resend and entrust request, perhaps directly refuse this trust request.
2. the procurator is from certificate of authority C
pIn separate out power of attorney A
p, and according to power of attorney A
pContent, whether accept commission people's trust request of decision.People's the trust request if accept commission is then carried out 3. step of this step the, if the people's that do not accept commission request is then directly refused this trusts and asked.
3. the procurator separates out delegable information M from entrust request
p
4. the procurator is from delegable information M
pIn separate out and entrust parameter Q
pWith authorization parameter S
p
5. procurator's hash digest algorithm according to a preconcerted arrangement calculates hash digest value H
p=Hash (C
P, Q
p).
6. the procurator verifies equation S
P* G=Q
P+ H
P* PK
AWhether set up.If equation is false, illustrate that then this delegable information is invalid, should require the clientage to resend and entrust request.If equation is set up, illustrate that then this delegable information is effectively, is accepted.And exercise electronic signature power according to scope of authority delegate people.
The 4th step: the procurator exercises the process of electronic signature power;
When the delegate people exercises electronic signature power in the procurator need the agent authority of power at oneself, carry out following operation:
1. the procurator is according to the delegable information M from being received
pIn the authorization parameter S that separates out
p, and the procurator calculates resulting hash digest value H
p, calculate authorization electronic signature private key SK
p=S
p+ SK
B* H
P
2. the procurator utilizes the authorization electronic signature private key SK that is generated
pWith the delegable information M that is received
p, ordinary electronic endorsement method by appointment, the electronics document M that needs are signed carries out the ordinary electronic signature, can get ordinary electronic signature S '=Sig (SK
p, M, M
p), then authorization electronic signature be S=(S ', Q
p).
3. the procurator generates the request authentication document, comprising: procuratorial identity information, this step the authentication message that 2. resulting authorization electronic signature S and request are notarized to the electronic signature of being signed in the step.
4. the procurator utilizes the private key SK of oneself
BSignature request authentication document obtains the request authentication text.
5. the procurator sends to the CA of authentication center, request authentication with the request authentication text.
6. the CA of authentication center confirms the integrality and the authenticity of this text after receiving the request authentication text that the procurator submits to.If wrong, then refusal provides authentication service, and requires the procurator to resend.If authentication is passed through, carry out the 7. step operation of this step.
7. the CA of authentication center searches for the maximum signature number of times of being set by the clientage in internal database, and the procurator the delegate people exercise the electronic signature power the signature number of times, if in the scope of the maximum of delegable signature number of times, then, the authorization electronic signature in the request authentication text of being received is signed and issued time stamp certificate T according to the time of receiving the request authentication text
P, revise the signature number of times information in the internal database simultaneously; Otherwise, provide authentication service with refusal, and terminating operation.
8. the CA of authentication center is with the time stamp certificate T that is signed
PReturn to the procurator.
9. the procurator is at the time stamp certificate T that receives by authentication center's signature
PAfterwards, this certificate is attached to after the message, the time-proven of the authorization electronic signature of the electronics document being signed as its delegate people is with electronics document M, authorization electronic signature S, certificate of authority C
pTogether, form electronic message (M, S, C
P, T
P).
The 5th step: the process of the electronic message that recipient's checking is received
Need be received in check as the recipient, during by the legitimacy of the electronic message of procurator's delegate people signature, carry out following operation:
1. the recipient separates out electronics document M, authorization electronic signature S, certificate of authority C from the electronic message of being received
pWith time stamp certificate T
P
2. the recipient utilizes clientage's PKI PK
A, the legitimacy of the checking certificate of authority.Utilize the PKI of authentication center, checking time stamp certificate T
PLegitimacy.If checking is not passed through, illustrate that then this electronic message is invalid.
3. the recipient is according to certificate of authority C
pAnd time stamp certificate T
P, check whether the procurator has the right to sign this electronics document, i.e. the authorization electronic signature behavior of whether in the maximum signature number of times of the mandate timeliness of the signature scope that limits, qualification, restriction, carrying out.If check and do not pass through, illustrate that then this electronic message is invalid.
4. the recipient separates out from authorization electronic signature S and entrusts parameter Q
p
5. recipient's hash digest algorithm according to a preconcerted arrangement calculates hash digest value H
p=Hash (C
p, Q
p).
6. the recipient is according to authorization electronic signature S, and clientage's PKI PK
AWith procuratorial PKI PK
B, calculate authorization electronic signature PKI PK
P=Q
P+ H
P* (PK
A+ PK
B).
7. the recipient is according to the ordinary electronic endorsement method that uses of arrange, and checking is by the legitimacy of the electronic message of procurator's delegate people signature, promptly function Ver (S ', PK
p, whether be true M).If value is for true, then this authorization electronic signature is legal; Otherwise then this authorization electronic signature is illegal.
The present invention compares with various electric endorsement methods before, and the present invention can realize electronic signature power is carried out safe and reliable delegable.The clientage can strictly control and comprise that the restriction procurator exercises the delegable electronic signature behavior of the timeliness of the scope of signature, setting delegable, the maximum signature of restriction number of times etc.This method not only meets the Electronic Signature Law defined to the integrality, resisting denying of electronic signature, anti-basic demand of forging etc. about the electronic signature legitimacy, and possesses very strong unforgeable, well outstanding character such as identity and very strong non-repudiation and the ability that prevents procurator's abuse of the power of agency power.
In addition, this method also possesses higher execution efficient, be easy to management, can resist various known attack methods, security is very high, authenticity, security, reliability and the legitimacy of electronic message can be guaranteed, various hardware environments such as computing machine, communication network, smart card, mobile phone can be widely used in, and every field such as e-commerce system, electronic government affairs system, information safety system, network communicating system.
Description of drawings
Accompanying drawing is the process flow diagram of authorization controlled electronic signature of the present invention.
Embodiment
The invention will be further described below in conjunction with embodiment, but this embodiment should not be construed as limitation of the present invention.
Selected at random 192 big prime number p, elliptic curve E (GF (p)): y
2=x
3+ ax+b (mod p) is a safety elliptic curve that is defined on the finite field gf (p), on it basic point of picked at random be G=(x, y), the rank of elliptic curve E are n=#E (GF (p)), r is the big prime factor of n.
Wherein,
p=6277101735386680763835789423207666416083908700390324961279
a=592616546630905635115220920655548752905575269097021663719
b=4804233895280899388319973107961190048453702796229268188014
n=165186887773333704311468142720121385129365739211127201127
r=165186887773333704311468142720121385129365739211127201127
x=767497456867608967492675205059054232203172713727662547906
y=773339505718536040565224929606618157393578012863049959916
If clientage's private key is SK
A, procuratorial private key is SK
B, both are the positive integer at random less than r-1, and then clientage's PKI is PK
A=SK
A* G, procuratorial PKI are PK
B=SK
B* G.
System agreement is used the hash digest algorithm of SHA-256 algorithm as agreement, and the EC-E1Gama1 algorithm is as the ordinary electronic signature algorithm, and operates by the step in the summary of the invention, can finish the flow process of authorization electronic signature.
Clearly, the present invention is not limited to the foregoing description, but can change under the situation that does not break away from invention scope and thought and revise.
The content that this instructions is not described in detail belongs to and well known to a person skilled in the art prior art.
Claims (1)
1, a kind of authorization controlled electronic signature method based on elliptic curve, its concrete steps are:
First step: determine systematic parameter, definite method of systematic parameter is: selected big integer p, elliptic curve E (GF (p)): y
2=x
3+ ax+b (modp) is a safety elliptic curve that is defined on the finite field gf (p), and basic point of picked at random is G on it, and when n=#E (GF (p)) is the rank of elliptic curve E, r is the big prime factor of n, when clientage's private key is SK
A, procuratorial private key is SK
B, both are the positive integer at random less than r-1, and then clientage's PKI is PK
A=SK
A* G, procuratorial PKI are PK
B=SK
B* G;
Second step: the clientage carries out delegable, and its process is:
1. the clientage generates the power of attorney A that is used to limit procuratorial signature authority
p, exercise the maximum signature number of times that extent of competence, procurator's delegate people of electronic signature power exercise electronic signature power comprising digital certificates, the valid period of delegable, procurator's delegate people of the authentication center of agreement, the explanation of relevant procurator's identity;
2. the clientage utilizes the private key SK of oneself
A, to limiting the power of attorney A of procuratorial signature authority
pCarry out the ordinary electronic signature, obtain being used to limit the certificate of authority C of procuratorial signature authority
p
3. the clientage is with certificate of authority C
pSend to the CA of authentication center;
4. the CA of authentication center sets the maximum signature number of times that procurator's delegate people exercises electronic signature power according to the certificate of authority in internal database on the basis that has authenticated the certificate of authority legitimacy of being received;
5. positive integer k less than r-1 of clientage's picked at random is calculated and is entrusted parameter Q
p=k * G;
6. clientage's hash digest algorithm according to a preconcerted arrangement calculates hash digest value H
p=Hash (C
P, Q
p);
7. the clientage is according to the private key SK of oneself
A, calculate authorization parameter S
p=H
p* SK
A+ k;
8. the clientage generates delegable information M according to entrusting parameter and authorization parameter
p=(S
p, Q
p);
9. the clientage is with certificate of authority C
pWith delegable information M
pAs entrusting request (C
p, M
P), send to the procurator;
Third step: the procurator verifies and entrusts request that its process is:
1. the procurator separates out certificate of authority C from entrust request
p, utilize clientage's PKI PK
A, if the legitimacy of the checking certificate of authority is certificate of authority C
pBe effectively, then carry out the 2. step of this step, entrust request, perhaps directly refuse this trusts to ask otherwise require the clientage to resend;
2. the procurator is from certificate of authority C
pIn separate out power of attorney A
p, and according to power of attorney A
pContent, whether accept commission people's trust request of decision is if the people's that accepts commission trust request is then carried out 3. step of this step the, if the people's that do not accept commission request is then directly refused this trusts to ask;
3. the procurator separates out delegable information M from entrust request
p
4. the procurator is from delegable information M
pIn separate out and entrust parameter Q
pWith authorization parameter S
p
5. procurator's hash digest algorithm according to a preconcerted arrangement calculates hash digest value H
p=Hash (C
P, Q
p);
6. the procurator verifies equation S
P* G=Q
P+ H
P* PK
AWhether set up,, illustrate that then this delegable information is invalid if equation is false, should require the clientage to resend and entrust request,, illustrate that then this delegable information is effective if equation is set up, accepted, and exercised electronic signature power according to scope of authority delegate people;
The 4th step: the agency is from exercising electronic signature power, and its process is:
1. the procurator is according to the delegable information M from being received
pIn the authorization parameter S that separates out
p, and the procurator calculates resulting hash digest value H
p, calculate authorization electronic signature private key SK
p=S
p+ SK
B* H
P
2. the procurator utilizes the authorization electronic signature private key SK that is generated
pWith the delegable information M that is received
p, ordinary electronic endorsement method by appointment, the electronics document M that needs are signed carries out the ordinary electronic signature, can get ordinary electronic signature S '=Sig (SK
p, M, M
p), then authorization electronic signature be S=(S ', Q
p);
5. the procurator generates the request authentication document, comprising: procuratorial identity information, this step the authentication message that 2. resulting authorization electronic signature S and request are notarized to the electronic signature of being signed in the step;
4. the procurator utilizes the private key SK of oneself
BSignature request authentication document obtains the request authentication text;
5. the procurator sends to the CA of authentication center, request authentication with the request authentication text;
6. the CA of authentication center confirms the integrality and the authenticity of this text after receiving the request authentication text that the procurator submits to, if wrong, then refusal provides authentication service, and requires the procurator to resend, if authentication is passed through, carries out the 7. step operation of this step;
7. the CA of authentication center searches for the maximum signature number of times of being set by the clientage in internal database, and the procurator the delegate people exercise the electronic signature power the signature number of times, if in the scope of the maximum of delegable signature number of times, then, the authorization electronic signature in the request authentication text of being received is signed and issued time stamp certificate T according to the time of receiving the request authentication text
P, revise the signature number of times information in the internal database simultaneously, otherwise, provide authentication service with refusal, and terminating operation;
8. the CA of authentication center is with the time stamp certificate T that is signed
PReturn to the procurator;
9. the procurator is at the time stamp certificate T that receives by authentication center's signature
PAfterwards, this certificate is attached to after the message, the time-proven of the authorization electronic signature of the electronics document being signed as its delegate people is with electronics document M, authorization electronic signature S, certificate of authority C
pTogether, form electronic message (M, S, C
P, T
P);
The 5th step: the electronic message that recipient's checking is received, its process is:
1. the recipient separates out electronics document M, authorization electronic signature S, certificate of authority C from the electronic message of being received
pWith time stamp certificate T
P
2. the recipient utilizes clientage's PKI PK
A, the legitimacy of the checking certificate of authority is utilized the PKI of authentication center, checking time stamp certificate T
PLegitimacy, if the checking do not pass through, illustrate that then this electronic message is invalid;
3. the recipient is according to certificate of authority C
pAnd time stamp certificate T
P, check whether the procurator has the right to sign this electronics document, i.e. the authorization electronic signature behavior of whether carrying out in the maximum signature number of times of the mandate timeliness of the signature scope that limits, qualification, restriction if check and do not pass through, illustrates that then this electronic message is invalid;
4. the recipient separates out from authorization electronic signature S and entrusts parameter Q
p
5. recipient's hash digest algorithm according to a preconcerted arrangement calculates hash digest value H
p=Hash (C
P, Q
p);
6. the recipient is according to authorization electronic signature S, and clientage's PKI PK
AWith procuratorial PKI PK
B, calculate authorization electronic signature PKI PK
P=Q
P+ H
P* (PK
A+ PK
B);
7. the recipient is according to the ordinary electronic endorsement method that uses of arrange, and checking is by the legitimacy of the electronic message of procurator's delegate people signature, promptly function Ver (S ', PK
p, whether be true M), if value is for true, then this authorization electronic signature is legal; Otherwise then this authorization electronic signature is illegal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100192144A CN100437611C (en) | 2005-08-03 | 2005-08-03 | Authorization controlled electronic signature method based on elliptical curve |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100192144A CN100437611C (en) | 2005-08-03 | 2005-08-03 | Authorization controlled electronic signature method based on elliptical curve |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1737721A CN1737721A (en) | 2006-02-22 |
CN100437611C true CN100437611C (en) | 2008-11-26 |
Family
ID=36080534
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2005100192144A Expired - Fee Related CN100437611C (en) | 2005-08-03 | 2005-08-03 | Authorization controlled electronic signature method based on elliptical curve |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100437611C (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100518059C (en) * | 2006-07-19 | 2009-07-22 | 上海交通大学 | Quadratic region code producing method and signature method |
CN109104396B (en) * | 2017-06-21 | 2021-03-16 | 上海钜真金融信息服务有限公司 | Block chain agent authorization method and medium based on agent signature |
CN113935070B (en) | 2021-12-16 | 2022-06-07 | 北京百度网讯科技有限公司 | Data processing method, device and equipment based on block chain and storage medium |
CN116318739B (en) * | 2023-05-23 | 2023-08-15 | 北京中超伟业信息安全技术股份有限公司 | Electronic data exchange method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20010047563A (en) * | 1999-11-22 | 2001-06-15 | 이계철 | Public key based mutual authentication method in wireless communication system |
US20030123656A1 (en) * | 2001-12-10 | 2003-07-03 | Fujitsu Limited | Elliptic curve cryptosystem apparatus, storage medium storing elliptic curve cryptosystem program, and elliptic curve cryptosystem arithmetic method |
KR20030060148A (en) * | 2002-01-07 | 2003-07-16 | 이임영 | A secure piconet organization and maintenance method with using Elliptic Curve Cryptography |
US20040022523A1 (en) * | 2002-01-18 | 2004-02-05 | Duerr Thomas E. | Digital video authenticator |
EP1135886B1 (en) * | 1998-12-10 | 2004-03-03 | Citibank, N.A. | Cryptosystems with elliptic curves chosen by users |
-
2005
- 2005-08-03 CN CNB2005100192144A patent/CN100437611C/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1135886B1 (en) * | 1998-12-10 | 2004-03-03 | Citibank, N.A. | Cryptosystems with elliptic curves chosen by users |
KR20010047563A (en) * | 1999-11-22 | 2001-06-15 | 이계철 | Public key based mutual authentication method in wireless communication system |
US20030123656A1 (en) * | 2001-12-10 | 2003-07-03 | Fujitsu Limited | Elliptic curve cryptosystem apparatus, storage medium storing elliptic curve cryptosystem program, and elliptic curve cryptosystem arithmetic method |
KR20030060148A (en) * | 2002-01-07 | 2003-07-16 | 이임영 | A secure piconet organization and maintenance method with using Elliptic Curve Cryptography |
US20040022523A1 (en) * | 2002-01-18 | 2004-02-05 | Duerr Thomas E. | Digital video authenticator |
Also Published As
Publication number | Publication date |
---|---|
CN1737721A (en) | 2006-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100571122C (en) | A kind of safe and reliable controlled authorization electronic signature method | |
CN100592684C (en) | An efficient authorization electronic signature method without authentication center | |
US20200304316A1 (en) | Implicitly Certified Digital Signatures | |
CN103259662B (en) | A kind of new allograph based on Integer Decomposition problem and verification method | |
CN102983971B (en) | Certificateless signature algorithm for user identity authentication in network environment | |
CN101136748B (en) | Identification authentication method and system | |
EP2533457B1 (en) | Secure implicit certificate chaining | |
CN103023648B (en) | Based on elliptic curves discrete logarithm problem without certificate signature method | |
CN109818730B (en) | Blind signature acquisition method and device and server | |
CN101931536B (en) | Method for encrypting and authenticating efficient data without authentication center | |
CN108737391B (en) | Method for quickly revoking identity of information service entity | |
CN105376064B (en) | A kind of anonymity message authentication system and its message signing method | |
KR20120007509A (en) | Method for authenticating identity and generating share key | |
CN110022542A (en) | A kind of anonymous authentication method of the modified based on condition secret protection | |
CN107483191A (en) | A kind of SM2 algorithm secret keys segmentation signature system and method | |
CN103347018A (en) | Long-distance identity authentication method based on intelligent card and under multiple-service environment | |
CN1193538C (en) | Electronic cipher formation and checking method | |
CN100437611C (en) | Authorization controlled electronic signature method based on elliptical curve | |
CN105554018A (en) | Network real name verification method | |
CN115238294A (en) | Digital RMB transaction privacy protection method, system and device based on mixed currency protocol | |
CN1581772A (en) | System and method for controlling a mobile terminal using a digital signature | |
CN101931535A (en) | Method for adaptively performing data encryption and authentication without authentication center | |
León-Coca et al. | Authentication systems using ID Cards over NFC links: the Spanish experience using DNIe | |
CN101262344B (en) | An efficient quick authorization electronic signature method | |
CN107040923A (en) | The authentication method and device of a kind of wearable device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20081126 Termination date: 20110803 |