CN101262344A - An efficient quick authorization electronic signature method - Google Patents

An efficient quick authorization electronic signature method Download PDF

Info

Publication number
CN101262344A
CN101262344A CNA2008100474695A CN200810047469A CN101262344A CN 101262344 A CN101262344 A CN 101262344A CN A2008100474695 A CNA2008100474695 A CN A2008100474695A CN 200810047469 A CN200810047469 A CN 200810047469A CN 101262344 A CN101262344 A CN 101262344A
Authority
CN
China
Prior art keywords
electronic signature
trustee
agent
parameter
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008100474695A
Other languages
Chinese (zh)
Other versions
CN101262344B (en
Inventor
肖攸安
刘泉
周祖德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University of Technology WUT
Original Assignee
Wuhan University of Technology WUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University of Technology WUT filed Critical Wuhan University of Technology WUT
Priority to CN2008100474695A priority Critical patent/CN101262344B/en
Publication of CN101262344A publication Critical patent/CN101262344A/en
Application granted granted Critical
Publication of CN101262344B publication Critical patent/CN101262344B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to a fast high-efficiency authorization method of electronic signature, which comprises the specific steps: 1) determining system parameters; 2) user registering; 3) client authorizing; 4) exerting electronic signature rights by agents; 5) verifying received data messages by receivers. Compared with previous various electronic signature methods, the fast high-efficiency authorization method of electronic signature of the invention not only successfully solves choke points of performance existed in the existing various methods, but also realizes safe and reliable authorization for electronic signature rights, ensuring that the clients can strictly control and restrict the agents to exert the rights within signature range. Besides, the fast high-efficiency authorization method of electronic signature of the invention also has comparatively high execution efficiency, is easy to be managed and able to resist against various known attacking methods, has high safety, can ensure the authenticity, safety, reliability and validity of data messages, can be widely applied to various software and hardware environments such as computers, communication networks, intelligent cards and mobile telephone, etc. and has good application prospect.

Description

A kind of authorization electronic signature method of efficient quick
Technical field
The invention belongs to the authorization electronic signature method of electric endorsement method in the filed of network information security, particularly a kind of efficient quick.
Background technology
In the every field relevant with information such as e-commerce system, electronic government affairs system, information safety system, network communicating system, electronic signature technology is one of extremely basic technology.It has simulated the function of real-life handwritten signature, not only have abilities such as authentication, source discriminating, resisting denying, anti-forgery, and can also carry out integrated authentication to the data text, and can guarantee authenticity, fail safe, reliability and the legitimacy of electronic message, thereby has very significant meaning for the normal operation of guarantee information system.In many countries, comprise China, electronic signature has all obtained jurally admitting.At present, effort through the lot of domestic and foreign scholar, many electric endorsement methods have appearred, for example: it is a kind of by the written handwriting of record user when utilizing wireless pen to carry out handwritten signature that application number is that 02153672.4 patent " a kind of signing and word-leaving method of utilizing wireless pen " discloses, with its method as document signature, but because this signature only is the simple simulation of handwritten signature, do not have direct relation with document content, therefore can't realize the 5th of China's Electronic Signature Law and the 13 defined integrality at all, resisting denying, anti-forgery waits the basic demand about the electronic signature legitimacy.Application number is that 01139001.8 patent " method for anti-counterfeit of electronic signature and device " then discloses a kind of electronic signature method for anti-counterfeit that is applied to bar code system, and its applicable surface is narrower.But all these methods all can not solve the delegable problem of electronic signature right.
In real world, people often need give reliable agent with some the signature assignable of authority of oneself, allow the agent represent and go to exercise these power in person.Entrust the conventional method of signature power to be to use seal, because seal can transmit between people neatly.Therefore, in the electronic signature field, we also are badly in need of a kind of method, realizing a kind of function that is similar to real-life seal and official seal, so that with oneself electronic signature right through committing others's method.
We find through retrieval, application number is that 200410052864.4 the patent method of delegable Electronic Signature safety " the stamped signature centralized management with " power of then will sign is all entrusted to believable OA system realize the signing delegable of power and operated, this method is at the OA system, take stamped signature centralized management system, the operation of realization delegable, therefore only can be applied to credible OA system, application surface is very narrow.Numerous safety issue such as in addition, this method exists also that signature can be forged, the integrality of document can't guarantee, the agent signs power is uncontrollable, trustee and agent can deny mutually.Application number be 200510019214.4 patent " a kind of authorization controlled electronic signature method " based on elliptic curve then by by believable third party's digital certificate service organization, a kind of safe and reliable authorization controlled electronic signature method based on elliptic curve of finding the solution difficulty based on the elliptic curve discrete logarithm problem on the finite field is provided.This method can make the trustee that scope of authority, signature time and signature number of times that the agent exercises electronic signature power are controlled reliably.
But all these methods all depend on a mechanism of trusted third party strongly as authentication center, in the course of work of electronic signature, need finish the generation or the authentication of electronic signature by user and authentication center by real-time, interactive, this has not only increased the weight of the work load of system greatly, reduce the operating efficiency of system, and seriously limited the promotion and application of electronic signature technology.
Used relational language is described as follows among the present invention:
According to the definition of the Electronic Signature Law of China, so-called electronic signature is meant in the electronic message to be used to discern signer's identity and to show that the signer approves the wherein data of content so that electronic form is contained, appended.And electronic message then is meant the information that generates, sends, receives or store with electronics, optics, electromagnetism or similar means.
The trustee refers to the signer who has original electronic signature power, and he can be as required, and oneself electronic signature assignable of authority is licensed to another signer, i.e. agent.
The agent refers to the delegable according to the trustee, exercises the signer of actual electronic signature power.
Authorization electronic signature refers to the delegable of agent according to the trustee, the electronic signature that the delegate people generates.
The recipient refers to the user who receives electronic message.
The digital certificate service organization that the third party that authentication center refers to is that set up according to the 17 of Electronic Signature Law, all approved by the parties is believable, provide the associated electrical authentication service, it can provide and meet Electronic Signature Law twenty-one provision defined electronic signature certificate.
KDC refers to the mechanism that is used for producing with user's cooperation client public key and proof of identification document thereof.
Summary of the invention
The objective of the invention is to deficiency, solve problems such as existing existing inefficiency of Proxy Signature Scheme and power control dynamics be weak, a kind of authorization electronic signature method of efficient quick is provided at prior art and method.
For achieving the above object, concrete steps of the present invention are:
First step: determine system parameters: selected at random big prime number p, the generator g of system is the positive integer less than p of a picked at random, and the private key of establishing KDC is SK SA, SK wherein SABe positive integer at random less than p-1, and corresponding PKI PK SA = g S K SA mod p ;
Second step: user registration: the trustee is by cooperating with the KDC, and the key that obtains oneself is to (SK A, PK A), finish registration process, concrete operations are as follows:
1) positive integer k of trustee's picked at random less than number p-1 a, calculate the registration parameter K A = g k a mod p , And send it to KDC;
2) the registration parameter K of being submitted to by the trustee is being received by KDC AAfterwards, positive integer k of picked at random, calculating trustee's PKI PK less than number p-1 A=K A* g kMod p;
3) KDC is according to trustee's PKI PK A, content such as trustee's identity information id, proof of identification document sequence number sn and the self information SA of KDC, generate relevant trustee's proof of identification document ID A, i.e. ID A=(PK A, id, sn, SA);
4) certificate parameter S calculates according to the hash digest algorithm Hash () of the prior agreement of system in KDC a=(Hash (ID A) * k+SK SA) mod r, and with key parameter (ID A, s a) send to the trustee;
5) trustee is receiving the key parameter (ID that is sent by KDC A, s a) after, therefrom separate out oneself PKI PK APKI PK with KDC SAEtc. information, verify equation then g s a = PK SA × ( PK A / K A ) Hash ( ID A ) mod p Whether set up; If set up, then carry out this step
The 6th) step; If be false, should require KDC to resend key parameter;
6) trustee is according to the key parameter (ID that is received A, s a), calculate the private key SK of oneself A=s a+ Hash (ID A) * k a, then trustee's key is to being (SK A, PK A);
Third step: the trustee carries out delegable: when the trustee because of certain reason, need delegable agent delegate people in specified scope to exercise electronic signature during power, carry out following operation: 1) positive integer k of agent's picked at random less than p-1 b, calculate random parameter K B = g k b mod p , And with its transmission trustee;
2) trustee is receiving the random parameter K that is submitted to by the agent BAfterwards, positive integer k of picked at random less than p-1 ', calculate and entrust parameter Q p=K B* g k' mod p;
3) trustee generates the power of attorney A that is used to limit procuratorial signature authority p, comprising the SA of KDC, the extent of competence S of delegable that power of attorney's sequence number sn ', agreement are arranged p, entrust parameter Q p, the trustee identity information ID AWith contents such as procuratorial identity information id ', i.e. A p=(sn ', SA, S p, Q p, ID A, id ');
4) trustee calculates and authorizes the effect parameter s according to the hash digest algorithm Hash () of the prior agreement of system Bp=(Hash (A p) * k '+SK A) mod r, and will entrust request (A p, s Bp) send to the agent;
5) agent is receiving trust request (A p, s Bp) after, therefrom separate out and entrust parameter Q p, trustee's identity information ID A, trustee's PKI PK AEtc. information, verify equation then g s bp = PK SA × PK A Hash ( ID A ) × ( Q p / K B ) Hash ( A p ) mod p Whether set up; If set up, illustrate that then this delegable information is effectively, accepted, and carry out this step the 6th) step; If be false, should require the trustee to resend and entrust request;
6) authorization electronic signature private key SK is calculated in agent's request of accepting commission p=s Bp+ Hash (A p) * k bSo far, the trustee has finished the delegable process that authorized agent delegate people in specified scope exercises electronic signature power, and the agent can exercise electronic signature power according to scope of authority delegate people;
The 4th step: the agent exercises electronic signature power: when the delegate people exercises electronic signature power to electronics document m in the agent need the agent authority of power at oneself, carry out following operation:
1) agent utilizes authorization electronic signature private key SK pWith the power of attorney A that is received p, ordinary electronic endorsement method by appointment is to message (m, A p) carry out the ordinary electronic signature, can get ordinary electronic signature S '=Sig (SK p, m, A p), then agent's delegate people to the authorization electronic signature that message m generated be S=(S ', A p);
2) agent combines electronics document m and authorization electronic signature S, and formation electronic message M=(m, S);
The 5th step: the electronic message that recipient checking is received: when the recipient need check received, during by the legitimacy of the electronic message of agent's delegate people signature, carry out following operation:
1) recipient separates out m, S, A from the electronic message M that is received pAnd Q pEtc. parameter, calculate the authorization electronic signature verification public key PK p = PK SA × PK A Hash ( ID A ) × Q p Hash ( A p ) mod p ;
2) recipient is according to power of attorney A pCheck agent's message m of whether having the right to sign, i.e. the authorization electronic signature behavior of whether carrying out in the signature scope that limits if check and do not pass through, illustrates that then this authorization electronic signature is invalid;
3) recipient utilizes the ordinary electronic endorsement method of agreement, the legitimacy of the authorization electronic signature S that checking is received, i.e. discriminant function Ver ((m, A p), S ', PK p) value whether be true; If value is for true, then this authorization electronic signature is legal; Otherwise then this authorization electronic signature is illegal.
Compare with various electric endorsement methods before, the present invention has not only successfully solved existing various with existing performance bottle top in the class methods, and can realize electronic signature power is carried out safe and reliable delegable, make the trustee can strictly control the restriction agent and exercise the scope of signature.The present invention not only meets the Electronic Signature Law defined to the integrality, resisting denying of electronic signature, anti-basic demand of forging etc. about the electronic signature legitimacy, and possesses very strong unforgeable, well outstanding character such as identity and very strong non-repudiation and the ability that prevents agent's abuse of the power of agency power.
In addition, the present invention also possesses higher execution efficient, be easy to management, can resist various known attack methods, fail safe is very high, can guarantee authenticity, fail safe, reliability and the legitimacy of electronic message, can be widely used in various hardware environments such as computer, communication network, smart card, mobile phone, and every field such as e-commerce system, electronic government affairs system, information safety system, network communicating system, have good application prospects.
Embodiment
The invention will be further described below in conjunction with embodiment, but this embodiment should not be construed as limitation of the present invention.
System parameters: the big prime number p of selected one 1024 bit, and one less than the positive integer g of the p generator as system.Wherein:
p=90263322638969161970869742926721592962852572876235477183189752231195515533726904774806425078297159311040039025083724608201473900514798177649413646622847127140417251504188523770133414476670262136197211023159073004450926935634808641348120991607495697378686487079903542524301817273543299305270754191090084623071
g=17678187918937189425425129762265348404304624186638463475929096597991555069648770683672843412379273268176113845487788768161966012911937393135864623398161
If the private key of KDC is SK SA, be the positive integer at random less than p-1, the PKI that it is corresponding PK SA = g SK SA mod p .
System agreement is used the hash digest algorithm of MD5 algorithm as agreement, and the DSA algorithm is as the ordinary electronic signature algorithm, and operates by concrete steps of the present invention, can finish the flow process of authorization electronic signature.
Clearly, the present invention is not limited to the foregoing description, but can change under the situation that does not break away from invention scope and thought and revise.
The present invention is based on the difficulty of finding the solution discrete logarithm problem on the finite multiplicative group, by power of attorney, original signer identity and proxy signers identity are organically combined, need not the help at third party's authentic authentication center, only need single stepping can finish all verification operations to the public key certificate that comprises the trustee, procuratorial public key certificate, power of attorney and authorization electronic signature, but also can help the trustee to realize that the scope of authority of the agent being exercised electronic signature power control effectively, and prevents agent's abuse of the power of agency power.
The content that this specification is not described in detail belongs to and well known to a person skilled in the art prior art.

Claims (1)

1, a kind of authorization electronic signature method of efficient quick, its concrete steps are:
First step: determine system parameters: selected at random big prime number p, the generator g of system is the positive integer less than p of a picked at random, and the private key of establishing KDC is SK SA, SK wherein SABe positive integer at random less than p-1, and corresponding PKI PK SA = g S K SA mod p ;
Second step: user registration: the trustee is by cooperating with the KDC, and the key that obtains oneself is to (SK A, PK A), finish registration process, concrete operations are as follows:
1) positive integer k of trustee's picked at random less than number p-1 a, calculate the registration parameter K A = g k a mod p , And send it to KDC;
2) the registration parameter K of being submitted to by the trustee is being received by KDC AAfterwards, positive integer k of picked at random, calculating trustee's PKI PK less than number p-1 A=K A* g kMod p;
3) KDC is according to trustee's PKI PK A, content such as trustee's identity information id, proof of identification document sequence number sn and the self information SA of KDC, generate relevant trustee's proof of identification document ID A, i.e. ID A=(PK A, id, sn, SA);
4) certificate parameter S calculates according to the hash digest algorithm Hash () of the prior agreement of system in KDC a=(Hash (ID A) * k+SK SA) mod r, and with key parameter (ID A, s a) send to the trustee;
5) trustee is receiving the key parameter (ID that is sent by KDC A, s a) after, therefrom separate out oneself PKI PK APKI PK with KDC SAEtc. information, verify equation then g s a = PK SA × ( PK A / K A ) Hash ( ID A ) mod p Whether set up; If set up, then carry out this step
The 6th) step; If be false, should require KDC to resend key parameter;
6) trustee is according to the key parameter (ID that is received A, s a), calculate the private key SK of oneself A=s a+ Hash (ID A) * k a, then trustee's key is to being (SK A, PK A);
Third step: the trustee carries out delegable: when the trustee because of certain reason, need delegable agent delegate people in specified scope to exercise electronic signature during power, carry out following operation:
1) positive integer k of agent's picked at random less than p-1 b, calculate random parameter K B = g k b mod p , And with its transmission trustee;
2) trustee is receiving the random parameter K that is submitted to by the agent BAfterwards, positive integer k of picked at random less than p-1 ', calculate and entrust parameter Q p=K B* g k' mod p;
3) trustee generates the power of attorney A that is used to limit procuratorial signature authority p, comprising the SA of KDC, the extent of competence S of delegable that power of attorney's sequence number sn ', agreement are arranged p, entrust parameter Q p, the trustee identity information ID AWith contents such as procuratorial identity information id ', i.e. A p=(sn ', SA, S p, Q p, ID A, id ');
4) trustee calculates and authorizes the effect parameter S according to the hash digest algorithm Hash () of the prior agreement of system Bp=(Hash (A p) * k '+SK A) mod r, and will entrust request (A p, S Bp) send to the agent;
5) agent is receiving trust request (A p, S Bp) after, therefrom separate out and entrust parameter Q p, trustee's identity information ID A, trustee's PKI PK AEtc. information, verify equation then g s bp = PK SA × PK A Hash ( ID A ) × ( Q p / K B ) Hash ( A p ) mod p Whether set up; If set up then explanation
This delegable information is effectively, accepted, and carry out this step the 6th) step; If be false, should require the trustee to resend and entrust request;
6) authorization electronic signature private key SK is calculated in agent's request of accepting commission p=S Bp+ Hash (A p) * k bSo far, the trustee has finished the delegable process that authorized agent delegate people in specified scope exercises electronic signature power, and the agent can exercise electronic signature power according to scope of authority delegate people;
The 4th step: the agent exercises electronic signature power: when the delegate people exercises electronic signature power to electronics document m in the agent need the agent authority of power at oneself, carry out following operation:
1) agent utilizes authorization electronic signature private key SK pWith the power of attorney A that is received p, ordinary electronic endorsement method by appointment is to message (m, A p) carry out the ordinary electronic signature, can get ordinary electronic signature S '=Sig (SK p, m, A p), then agent's delegate people to the authorization electronic signature that message m generated be S=(S ', A p);
2) agent combines electronics document m and authorization electronic signature S, and formation electronic message M=(m, S);
The 5th step: the electronic message that recipient checking is received: when the recipient need check received, during by the legitimacy of the electronic message of agent's delegate people signature, carry out following operation: 1) recipient separates out m, S, A from the electronic message M that is received pAnd Q pEtc. parameter, calculate the authorization electronic signature verification public key PK p = PK SA × PK A Hash ( ID A ) × Q p Hash ( A p ) mod p ;
2) recipient is according to power of attorney A pCheck agent's message m of whether having the right to sign, i.e. the authorization electronic signature behavior of whether carrying out in the signature scope that limits if check and do not pass through, illustrates that then this authorization electronic signature is invalid;
3) recipient utilizes the ordinary electronic endorsement method of agreement, the legitimacy of the authorization electronic signature S that checking is received, i.e. discriminant function Ver ((m, A p), S ', PK p) value whether be true; If value is for true, then this authorization electronic signature is legal; Otherwise then this authorization electronic signature is illegal.
CN2008100474695A 2008-04-25 2008-04-25 An efficient quick authorization electronic signature method Expired - Fee Related CN101262344B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008100474695A CN101262344B (en) 2008-04-25 2008-04-25 An efficient quick authorization electronic signature method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008100474695A CN101262344B (en) 2008-04-25 2008-04-25 An efficient quick authorization electronic signature method

Publications (2)

Publication Number Publication Date
CN101262344A true CN101262344A (en) 2008-09-10
CN101262344B CN101262344B (en) 2011-11-16

Family

ID=39962570

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008100474695A Expired - Fee Related CN101262344B (en) 2008-04-25 2008-04-25 An efficient quick authorization electronic signature method

Country Status (1)

Country Link
CN (1) CN101262344B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102737313A (en) * 2012-05-25 2012-10-17 天地融科技股份有限公司 Method and system for authorizing verification on electronic signature tools and electronic signature tools
CN109104396A (en) * 2017-06-21 2018-12-28 上海钜真金融信息服务有限公司 A kind of block chain agent authorization method based on allograph, medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100541532C (en) * 2004-07-15 2009-09-16 上海交通大学 The method of stamped signature centralized management and delegable Electronic Signature safety
CN100571122C (en) * 2005-08-03 2009-12-16 武汉理工大学 A kind of safe and reliable controlled authorization electronic signature method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102737313A (en) * 2012-05-25 2012-10-17 天地融科技股份有限公司 Method and system for authorizing verification on electronic signature tools and electronic signature tools
CN109104396A (en) * 2017-06-21 2018-12-28 上海钜真金融信息服务有限公司 A kind of block chain agent authorization method based on allograph, medium
CN109104396B (en) * 2017-06-21 2021-03-16 上海钜真金融信息服务有限公司 Block chain agent authorization method and medium based on agent signature

Also Published As

Publication number Publication date
CN101262344B (en) 2011-11-16

Similar Documents

Publication Publication Date Title
CN100592684C (en) An efficient authorization electronic signature method without authentication center
CN100571122C (en) A kind of safe and reliable controlled authorization electronic signature method
US10944575B2 (en) Implicitly certified digital signatures
CN102983971B (en) Certificateless signature algorithm for user identity authentication in network environment
US10148422B2 (en) Implicitly certified public keys
CN102170352B (en) Method of using ECDSA with winternitz one time signature
CN103259662B (en) A kind of new allograph based on Integer Decomposition problem and verification method
CN101931536B (en) Method for encrypting and authenticating efficient data without authentication center
CN104901809B (en) Remote authentication protocol method based on password and smart card
CN107483191A (en) A kind of SM2 algorithm secret keys segmentation signature system and method
CN103347018A (en) Long-distance identity authentication method based on intelligent card and under multiple-service environment
CN104767624A (en) Remote protocol authentication method based on biological features
CN103346887A (en) Low-complexity identity authentication method based on intelligent card and under multiserver environment
CN115238294A (en) Digital RMB transaction privacy protection method, system and device based on mixed currency protocol
CN101931535A (en) Method for adaptively performing data encryption and authentication without authentication center
CN100437611C (en) Authorization controlled electronic signature method based on elliptical curve
CN101262344B (en) An efficient quick authorization electronic signature method
Chernyi et al. Security of electronic digital signature in maritime industry
CN109978518B (en) Implicit certificate distribution method and system
CN114638009A (en) Electronic signature system suitable for public key cryptography and supporting commercial cryptographic algorithm
CN101420304B (en) Security protection method for electronic document digital signature based on discrete logarithm
CN105119921B (en) Suitable for the traceable Electronic Signature management method of server cluster
CN110061841B (en) Signature method, signature verification method and signature verification device
CN103354500A (en) Sanitizable agent signature method in standard model
CN115473635B (en) SM2 two-party adapter signature generation method and device for preventing malicious enemy

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20111116

Termination date: 20140425