TW201737152A - Digital signature verification system validating signature between customer C1 and customer C2 - Google Patents

Digital signature verification system validating signature between customer C1 and customer C2 Download PDF

Info

Publication number
TW201737152A
TW201737152A TW105111306A TW105111306A TW201737152A TW 201737152 A TW201737152 A TW 201737152A TW 105111306 A TW105111306 A TW 105111306A TW 105111306 A TW105111306 A TW 105111306A TW 201737152 A TW201737152 A TW 201737152A
Authority
TW
Taiwan
Prior art keywords
signature
message
client
pid
arbiter
Prior art date
Application number
TW105111306A
Other languages
Chinese (zh)
Other versions
TWI599909B (en
Inventor
黃宗立
羅翊萍
Original Assignee
國立成功大學
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 國立成功大學 filed Critical 國立成功大學
Priority to TW105111306A priority Critical patent/TWI599909B/en
Application granted granted Critical
Publication of TWI599909B publication Critical patent/TWI599909B/en
Publication of TW201737152A publication Critical patent/TW201737152A/en

Links

Abstract

The invention provides a digital signature verification system. The system is used for validating signature between customer C1 and customer C2. Arbiter of system receives signature generated by performing encryption of message h through signature key used by customer C1. Authentication center of the system acquires signature from arbiter, and uses signature key to perform encryption for signature to acquire message h. Random key is used for generating random authentication message h MAC. Encryption of random key is performed by using encryption key of arbiter for generating encryption information R. Arbiter acquires random authentication message h MAC and encryption information R, and performs decryption for acquiring random key. Furthermore, arbiter uses message h to generate message verification code h MAC'. Finally, arbiter compares h MAC' and h MAC for verifying accuracy of signature.

Description

電子簽章驗證系統 Electronic signature verification system

本發明係一種電子簽章驗證系統,尤指一種藉由仲裁者端或認證中心端之協助進行簽章驗證之電子簽章驗證系統。 The invention relates to an electronic signature verification system, in particular to an electronic signature verification system for signature verification by means of an arbitrator or a certification center.

為提昇通訊之安全性以及訊息之不可否認性,現行之通訊加密機制在傳送資料時,發送方多會在傳送訊息內附加驗證簽章,而接收方在收到此訊息後,即可透過驗證該簽章之正確性,以確定所接收到的訊息是否由發送方所發出。 In order to improve the security of the communication and the non-repudiation of the message, the current communication encryption mechanism will send a verification signature to the transmission message when the data is transmitted, and the receiver can verify the message after receiving the message. The signature is correct to determine if the received message was sent by the sender.

因此當惡意第三方欲發送惡意訊息時,多會設法偽造發送方之簽章,並發送附有偽造簽章之訊息至接收方,以達到欺騙之目的。 Therefore, when a malicious third party wants to send a malicious message, it will try to falsify the sender's signature and send a message with a forged signature to the recipient to achieve the purpose of deception.

為解決上述之問題,習知技術更提出藉由仲裁方來判斷簽章正確性之技術方案。該方案係讓傳輸雙方將簽章之加解密金鑰交付給仲裁方,而當雙方有認證需求時,會將簽章交由給仲裁方進行驗證。惟此種方案中,由於仲裁方持有可加解密之簽章金鑰,因此當仲裁方被入侵時,或內部機敏資料被不當使用時,都會嚴重危害整體通訊之安全性。 In order to solve the above problems, the prior art further proposes a technical solution for judging the correctness of the signature by the arbitrator. The scheme allows the transmitting parties to deliver the signature encryption and decryption key to the arbitrator, and when both parties have the certification requirements, the signature will be handed over to the arbitrator for verification. However, in this scheme, since the arbitrator holds the signature key that can be encrypted and decrypted, when the arbitrator is hacked, or the internal smart data is improperly used, the security of the overall communication will be seriously jeopardized.

綜上所述,如何提供一種可提昇簽章安全之技術方案乃本領域亟需解決之技術問題。 In summary, how to provide a technical solution that can improve the security of the signature is a technical problem that needs to be solved in the field.

為解決前揭之問題,本發明之目的係提供一種可針對簽章進行驗證之電子簽章驗證系統。 In order to solve the problems disclosed above, it is an object of the present invention to provide an electronic signature verification system that can be verified for signatures.

為達上述目的,本發明提出一種電子簽章驗證系統。前述之系統用於驗證第一客戶端C1與第二客戶端C2間之簽章。此系統包含仲裁者端以及認證中心端。前述之仲裁者端自第一客戶端接收簽章,前述之簽章係由第一客戶端C1使用簽章金鑰對第一訊息h進行加密所產生。前述之認證中心端通訊連接仲裁者端以取得簽章,並使用簽章金鑰對簽章進行解密以取得第一訊息h,以及使用隨機金鑰產生隨機驗證訊息hMAC,並使用仲裁者端之加密金鑰對隨機金鑰進行加密,以產生一加密資訊R。而當仲裁者端取得隨機驗證訊息hMAC以及加密資訊R,並進行解密以取得隨機金鑰,仲裁者端更使用隨機金鑰以及第一訊息h以產生訊息驗證碼hMAC' 。此外,仲裁者端更比對訊息驗證碼hMAC' 以及隨機驗證訊息hMAC,以提供簽章判斷結果。 To achieve the above object, the present invention provides an electronic signature verification system. The foregoing system is used to verify the signature between the first client C 1 and the second client C 2 . This system includes an arbiter and a certificate authority. The aforementioned arbitrator receives the signature from the first client , the aforementioned signature Is the signature key used by the first client C 1 The first message h is encrypted. The aforementioned authentication center end communication is connected to the arbiter to obtain the signature And use the signature key Signature Decrypt to get the first message h, and use the random key Generate random authentication message h MAC and use the arbitrator's encryption key Random key Encryption is performed to generate an encrypted information R. When the arbiter obtains the random authentication message h MAC and the encrypted information R, and decrypts it to obtain a random key. The arbitrator uses a random key And the first message h to generate a message verification code h MAC ' . In addition, the arbiter side compares the message verification code h MAC ' and the random verification message h MAC to provide a signature judgment result.

為達上述之目的,本發明另提出一種不藉由仲裁者端進行驗證之電子簽章驗證系統,前述之電子簽章驗證系統用於驗證第一客戶端C1與第二客戶端C2間之簽章SIGS,前述之簽章SIGS係由第一客戶端C1使用簽章金鑰對第一訊息h進行加密所產生,電子簽章驗證系統包含一認證中心端。前述之認證中心端接收來自第二客戶端C2傳送簽章端隨機虛擬身份識別資訊PIDS、簽章接收端隨機虛擬身份識別資訊PIDR、以及簽章SIGS,認 證中心端更藉由PIDS之簽章金鑰對簽章SigS解密以獲得, 此外認證中心端更產生會話金鑰SKR並計算 ,並藉由PIDR的加密金鑰計算,又傳 送訊息RR以及訊息給第二客戶端C2。而第二客戶端C2接收到來自認證中心端之資訊後,藉由加密金鑰解密RR來獲得,並計算訊息hR '=H(M||PIDS||PIDR||RIDS||T),以及計算訊息 ,並比較以及,當比較結果為符 合時,即可確認為來自第一客戶端C1之訊息。 For the above purposes, the present invention further provides an electronic signature verification system that is not verified by an arbiter, and the foregoing electronic signature verification system is used to verify the relationship between the first client C 1 and the second client C 2 Signature SIG S , the aforementioned signature SIG S is used by the first client C 1 to use the signature key The first message h is encrypted, and the electronic signature verification system includes an authentication center. The foregoing authentication center receives the random virtual identification information PID S from the second client C 2 , the random virtual identification information PID R of the signature receiving end, and the signature SIG S , and the authentication center further uses the PID. S of the signature key for decryption to obtain the signature Sig S In addition, the authentication center further generates the session key SK R and calculates And calculated by the encryption key of PID R , and send the message R R and the message Give the second client C 2 . After the second client C 2 receives the information from the authentication center, the encryption key is used. Decrypt R R to get And calculate the message h R ' =H(M||PID S ||PID R ||RID S ||T), and calculate the message And compare as well as When the comparison result is met, to confirm the end of the message from the first client of C 1.

綜上所述,當客戶端在進行通訊時,可藉由仲裁者端或認證中心端之協助來驗證簽章之正確性,相較於習知之簽章驗證方案,本發明可有效的提高整體通訊之安全性。 In summary, when the client is communicating, the correctness of the signature can be verified by the assistance of the arbiter or the certification center. Compared with the conventional signature verification scheme, the present invention can effectively improve the overall The security of communication.

1‧‧‧認證中心端 1‧‧‧Certification Center

2‧‧‧仲裁者端 2‧‧‧ Arbitrator

3‧‧‧客戶端 3‧‧‧Client

31‧‧‧簽章端 31‧‧‧ signature end

32‧‧‧簽章接收端 32‧‧‧Signature Receiver

圖1係為本發明電子簽章驗證系統之系統示意圖。 1 is a schematic diagram of a system of an electronic signature verification system of the present invention.

圖2係為本發明電子簽章驗證系統之簽章階段流程示意圖。 2 is a schematic flow chart of the signature phase of the electronic signature verification system of the present invention.

圖3係為本發明電子簽章驗證系統之驗證階段流程示意圖。 FIG. 3 is a schematic flow chart of the verification phase of the electronic signature verification system of the present invention.

圖4係為本發明電子簽章驗證系統之確認階段流程示意圖。 4 is a schematic flow chart of the confirmation phase of the electronic signature verification system of the present invention.

圖5係本發明不藉由仲裁者端進行驗證之電子簽章驗證系統之驗證流程圖。 FIG. 5 is a verification flow chart of the electronic signature verification system of the present invention which is not verified by the arbiter.

以下將描述具體之實施例以說明本發明之實施態樣,惟其並非用以限制本發明所欲保護之範疇。 The specific embodiments are described below to illustrate the embodiments of the invention, but are not intended to limit the scope of the invention.

請參閱圖1,其為本發明電子簽章驗證系統之系統示意圖。於該系統中包含認證中心端1、仲裁者端2、以及複數個客戶端3(以下茲以簽 章端以及簽章接收端進行說明)。每個客戶端3以及仲裁者端2會向認證中心端1進行註冊並取得對應之虛擬身份識別資訊PIDU、簽章金鑰、以及加密金鑰。此外,每個客戶端3可向仲裁者端2註冊真實身份資訊RIDU以及對應的虛擬身份資訊PIDU,以讓利仲裁者端2之識別。 Please refer to FIG. 1 , which is a schematic diagram of a system of an electronic signature verification system according to the present invention. The system includes a certification center end 1, an arbiter end 2, and a plurality of clients 3 (hereinafter referred to as the signature end and the signature receiving end). Each client 3 and arbitrator 2 will register with the authentication center 1 and obtain the corresponding virtual identification information PID U and signature key. And encryption keys . In addition, each client 3 can register the real identity information RID U and the corresponding virtual identity information PID U to the arbiter 2 to facilitate the identification of the arbiter 2 .

前述之認證中心端1係取得其他方之信任,並協助各方進行通訊時之認證作業。前述之仲裁者端2則是協助接收簽章方來確認簽章之正確性,並記錄驗證時之的資訊。前述之客戶端3可分別簽章端31以及簽章接收端32,簽章端31可利用簽章金鑰對訊息進行簽署以產生簽章,而簽章接收端32在接收此簽章後,可請求仲裁者端2來驗證該簽章。 The aforementioned certification center end 1 acquires the trust of other parties and assists the parties in the authentication operation during communication. The arbiter 2 mentioned above assists in receiving the signature to confirm the correctness of the signature and to record the information at the time of verification. The foregoing client 3 can respectively sign the signature end 31 and the signature receiving end 32, and the signature end 31 can use the signature key to sign the message to generate the signature, and the signature receiving end 32 receives the signature. The arbitrator 2 can be requested to verify the signature.

為進一步說明本發明之電子簽章驗證系統,茲定義各個符號如表1所示: To further illustrate the electronic signature verification system of the present invention, the various symbols are defined as shown in Table 1:

於本發明中,當簽章端欲發送簽章至簽章接收端後,而簽章接收端欲驗證此簽章時,可將簽章傳送至仲裁者端2進行驗證,或者藉由認證中心端1的協助以自行驗證。本發明將驗證流程劃分成簽章階段、驗證階段、以及確認階段。各階段說明如下: In the present invention, when the signature end wants to send the signature to the signature receiving end, and the signature receiving end wants to verify the signature, the signature can be transmitted to the arbiter 2 for verification, or by the certification center. End 1's assistance to self-verify. The invention divides the verification process into a signature phase, a verification phase, and an validation phase. The stages are explained as follows:

簽章階段Signature stage

請參閱圖2之說明,其為本發明簽章階段之流程示意圖,各步驟說明如下: Please refer to the description of FIG. 2 , which is a schematic flowchart of the signing stage of the present invention, and the steps are as follows:

S101:簽章端31(第一客戶端)計算訊息h=H(M||PIDS||PIDR||RIDS||T),並 產生簽章S101: The signature end 31 (first client) calculates a message h=H(M||PID S ||PID R ||RID S ||T), and generates a signature .

S102:簽章端31傳送PIDS、PIDR、SigS、M、以及T至簽章接收端32(第二客戶端)。 S102: The signature end 31 transmits PID S , PID R , Sig S , M, and T to the signature receiving end 32 (second client).

驗證階段Verification phase

請參閱圖3之說明,於此階段中當簽章接收端32欲驗證簽章時,可選擇下列二個方案進行驗證: Please refer to the description of FIG. 3. In this stage, when the signature receiving end 32 wants to verify the signature, the following two schemes can be selected for verification:

方案(1):藉由仲裁者端2進行在線/離線驗證,此處之在線/離線驗證係指仲裁者端2與簽章端31之間的是否經由連線進行驗證。當使用離線驗證方案時,簽章接收端32會將收到的PIDS、PIDR、SigS、M、以及T傳送至仲裁者端2,而仲裁者端2則會請求認證中心端1協助認證;反之,若採取在線驗證方案時,在前述步驟S102中,簽章端31會將PIDS、PIDR、SigS、M、以及T直接傳送給仲裁者端2,並讓仲裁者端2向認證中心端1請求協助認證。 Solution (1): Online/offline verification is performed by the arbiter 2, where online/offline verification refers to whether the connection between the arbiter 2 and the signature end 31 is verified via a connection. When the offline verification scheme is used, the signature receiving end 32 transmits the received PID S , PID R , Sig S , M , and T to the arbiter 2, and the arbiter 2 requests the authentication center 1 to assist. If the online verification scheme is adopted, in the foregoing step S102, the signature end 31 will directly transmit the PID S , PID R , Sig S , M, and T to the arbiter 2, and let the arbiter 2 Request authentication assistance from the certification center end 1.

方案(2):不藉由仲裁者端2進行驗證。考量部分應用上要求快速驗證,因此於方案(2)中簽章接收端32可透過認證中心端1之協助來自行驗證簽章。 Scheme (2): Verification is not performed by the arbiter 2 . Some applications require quick verification. Therefore, in the scheme (2), the signature receiving end 32 can authenticate the signature through the assistance of the authentication center end 1.

方案(1)驗證階段之步驟說明如下: The steps of the verification phase of the scheme (1) are as follows:

S201:若為離線驗證時,仲裁者端2接收簽章接收端32之請求後,仲裁者端2將PIDS、PIDA、以及SigS傳送至認證中心端1。反之,若為在線驗證時,則仲裁者端2接收簽章31之請求後,仲裁者端2將PIDS、PIDA、以及SigS傳送至認證中心端1。 S201: In the case of offline verification, after the arbitrator 2 receives the request of the signature receiving end 32, the arbitrator 2 transmits the PID S , the PID A , and the Sig S to the authentication center end 1. On the other hand, in the case of online verification, after the arbitrator 2 receives the request of the signature 31, the arbitrator 2 transmits the PID S , PID A , and Sig S to the authentication center terminal 1.

S202:認證中心端1使用PIDS的簽章金鑰(例如:)解密簽章SigS,以取得 第一訊息。接著,認證中心端1產生對話密鑰SKA並 計算隨機驗證訊息。接著,認證中心 端1藉由PIDA之加密金鑰(例如:)計算,並將RA以 及傳送至仲裁者端2。 S202: The authentication center end 1 uses the signature key of the PID S (for example: ) Decrypt the signature Sig S to get the first message . Next, the authentication center 1 generates a session key SK A and calculates a random verification message. . Next, the authentication center end 1 uses the encryption key of PID A (for example: Calculation And R A and Transfer to the arbiter terminal 2.

S203:仲裁者端2在接收到認證中心端1之訊息後,則使用加密金鑰對RA進行解密以取得SKA ',接著,仲裁者端2透過接收之訊息(例如:PIDS、PIDR、M、T)來計算h'=H(M||PIDS||PIDR||RIDS||T),前述之RIDS在 註冊階段已先註冊於仲裁者端2。接著,仲裁者端2計算 ,並比較以及。當比較結果為符合 時,則設驗證參數r=1;若不符合時,則設驗證參數r=0。 S203: After receiving the message of the authentication center end 1, the arbitrator 2 uses the encryption key. Decrypting R A to obtain SK A ' , then, the arbiter 2 calculates h ' = H(M||PID S ||PID R by receiving the message (for example: PID S , PID R , M, T) ||RID S ||T), the aforementioned RID S has been registered with the arbiter 2 at the registration stage. Then, the arbiter end 2 calculates And compare as well as . When the comparison result is met, the verification parameter r=1 is set; if not, the verification parameter r=0 is set.

S204:仲裁者端2計算hA=H(r||SigS||M||T||PIDS||PIDR||PIDA),並產生簽 章S204: Arbitrator end 2 calculates h A = H(r||Sig S ||M||T||PID S ||PID R ||PID A ), and generates a signature .

S205:仲裁者端2傳送驗證參數r以及SigA至簽章接收端32。 S205: The arbiter terminal 2 transmits the verification parameter r and the Sig A to the signature receiving end 32.

方案(1)之確認階段步驟說明如下:請參圖4之說明,於此階段中簽章接收端32可透過驗證參數r得知簽章端31之簽章SigS以及仲裁者端2之簽章SigA之驗證結果。各步驟說明如下: The steps of the confirmation phase of the scheme (1) are as follows: Please refer to the description of FIG. 4, in this stage, the signature receiving end 32 can know the signature Sig S of the signature end 31 and the sign of the arbiter end 2 through the verification parameter r. Chapter Sig A verification results. The steps are explained as follows:

S301:簽章接收端32傳送PIDA、PIDR、以及SigA至認證中心端1。 S301: The signature receiving end 32 transmits PID A , PID R , and Sig A to the authentication center end 1.

S302:相似於S202,認證中心端1藉由PIDA之簽章金鑰(例如:)對簽章 SigA解密,以獲得訊息。接著,認證中心端1產生會 話金鑰SKR並計算。接著,認證中心 端1藉由PIDR的加密金鑰(例如:)計算S302: Similar to S202, the authentication center end 1 is authenticated by the PID A (for example: ) Decrypt the signature Sig A to get the message . Next, the authentication center end 1 generates a session key SK R and calculates . Next, the authentication center end 1 uses the encryption key of the PID R (for example: Calculation .

S303:認證中心端1傳送RR以及至簽章接收端32。 S303: The authentication center end 1 transmits R R and To the signature receiving end 32.

S304:簽章接收端32在接收到來自認證中心端1之資訊後,簽章接收端32藉由加密金鑰解密RR來獲得。接著,簽章接收端32計算訊息h R '=H(r||SigS||M||T||PIDS||PIDR||PIDA)。再者,簽章接收端32計算 訊息。最後,比較以及, 當比較結果為符合時,即可確認為來自仲裁者端2之訊息。 S304: After the signature receiving end 32 receives the information from the authentication center end 1, the signature receiving end 32 uses the encryption key. Decrypt R R to get . Next, the signature receiving end 32 calculates the message h R ' = H(r||Sig S ||M||T||PID S ||PID R ||PID A ). Furthermore, the signature receiving end 32 calculates the message. . Finally, compare as well as When the comparison result is met, it can be confirmed as the message from the arbiter end 2.

請接著參閱圖5,其為方案(2)之驗證流程圖,驗證步驟說明如下: Please refer to FIG. 5, which is a verification flowchart of the scheme (2), and the verification steps are as follows:

S401:簽章接收端32(第二客戶端)傳送簽章端隨機虛擬身份識別資訊PIDS、簽章接收端隨機虛擬身份識別資訊PIDR、以及SIGS至認證中心端1。 S401: The signature receiving end 32 (the second client) transmits the signature virtual random identification information PID S , the signature receiving end random virtual identification information PID R , and the SIG S to the authentication center end 1 .

S402:相似於S202,認證中心端1藉由PIDS之簽章金鑰(例如:)對簽章SigS 解密以獲得訊息。接著,認證中心端1產生會話金鑰 SKR並計算訊息。接著,認證中心端1 藉由PIDR的加密金鑰(例如:)計算訊息S402: Similar to S202, the authentication center end 1 is authenticated by the PID S (for example: ) Decrypt the signature Sig S to get the message . Next, the authentication center 1 generates the session key SK R and calculates a message. . Next, the authentication center end 1 uses the encryption key of PID R (for example: ) calculation message .

S403:認證中心端1傳送RR以及給簽章接收端32。 S403: The authentication center end 1 transmits R R and Give the signature receiver 32.

S404:簽章接收端32在接收到來自認證中心端1之資訊後,簽章接收端32藉由加密金鑰解密RR來獲得。接著,簽章接收端32計算訊息h R '=H(M||PIDS||PID R ||RID S ||T)。再者,簽章接收端32計算訊息 。最後,比較以及,當比 較結果為符合時,即可確認為來自簽章端31(第一客戶端)之訊息。 S404: After the signature receiving end 32 receives the information from the authentication center end 1, the signature receiving end 32 uses the encryption key. Decrypt R R to get . Next, the signature receiving end 32 calculates the message h R ' = H(M||PID S || PID R || RID S || T ). Furthermore, the signature receiving end 32 calculates the message. . Finally, compare as well as When the comparison result is met, it can be confirmed as the message from the signature end 31 (first client).

前述客戶端3、仲裁者端2、以及認證中心端1可運行一部或多部連線之電腦裝置,而所執行之運算可藉由ASP、C/C++/C#、JAVA、Python、PHP、Perl等程式語言實現之,惟其程式語言之類別不在此限。 The foregoing client 3, the arbiter 2, and the authentication center 1 can run one or more connected computer devices, and the operations performed can be performed by ASP, C/C++/C#, JAVA, Python, PHP, It is implemented in a programming language such as Perl, except for the category of its programming language.

上列詳細說明係針對本發明之一可行實施例之具體說明,惟該實施例並非用以限制本發明之專利範圍,凡未脫離本發明技藝精神所為之等效實施或變更,均應包含於本案之專利範圍中。 The detailed description of the preferred embodiments of the present invention is intended to be limited to the scope of the invention, and is not intended to limit the scope of the invention. The patent scope of this case.

1‧‧‧認證中心端 1‧‧‧Certification Center

2‧‧‧仲裁者端 2‧‧‧ Arbitrator

3‧‧‧客戶端 3‧‧‧Client

Claims (7)

一種電子簽章驗證系統,用於驗證第一客戶端C1與第二客戶端C2間之簽章,包含:仲裁者端,包含:自該第一客戶端接收該簽章;其中該簽章係由該第一客戶端C1使用簽章金鑰對第一訊息h進行加密所產生;認證中心端,通訊連接該仲裁者端以取得該簽章,包含:使用該簽章金鑰對該簽章進行解密,以取得該第一訊息h;使用隨機金鑰產生隨機驗證訊息hMAC,並使用該仲裁者端之加密金鑰對該隨機金鑰進行加密,以產生一加密資訊R;其中,該仲裁者端更取得該隨機驗證訊息hMAC以及該加密資訊R,並進行解密以取得該隨機金鑰,該仲裁者端更使用該隨機金鑰以及該第一訊息h以產生訊息驗證碼hMAC' ;其中,該仲裁者端更比對該訊息驗證碼hMAC' 以及該隨機驗證訊息hMAC,以提供簽章判斷結果。 An electronic signature verification system for verifying the signature between the first client C 1 and the second client C 2 , comprising: an arbiter, comprising: receiving the signature from the first client Where the signature Using the signature key by the first client C 1 Encrypting the first message h; the authentication center is connected to the arbiter to obtain the signature , contains: use the signature key The signature Decrypt to obtain the first message h; use a random key Generate a random verification message h MAC and use the arbitrator's encryption key The random key Encrypting to generate an encrypted information R; wherein the arbiter obtains the random authentication message h MAC and the encrypted information R, and decrypts to obtain the random key The arbitrator uses the random key more And the first message h is used to generate a message verification code h MAC ' ; wherein the arbiter end compares the message verification code h MAC ' and the random verification message h MAC to provide a signature judgment result. 如請求項1所述之電子簽章驗證系統,其中該第一訊息h係對需被簽名訊息M、該第一客戶端C1之第一隨機虛擬身份識別資訊PIDC1、該第二客戶端C2之第二隨機虛擬身份識別資訊PIDC2、該第一客戶端之真實身份識別資訊、或時間戳記資訊T進行雜湊處理所產生。 The requested item of electronic signature verification system of claim 1, wherein the first message M h needs to be signed based on the message, the first client terminal C of the first pseudo random identification information PID C1, the second client The second random virtual identification information PID C2 of C 2 and the real identification information of the first client Or the time stamp information T is generated by hash processing. 如請求項2所述之電子簽章驗證系統,其中該仲裁者端於判斷該簽章判斷 結果為成功下,則計算hA=H(r||SigS||M||T||PIDS||PIDR||PIDA),並產生 簽章,接著仲裁者端傳送該簽章判斷結果以及SigA至該 第二客戶端C2The electronic signature verification system according to claim 2, wherein the arbitrator determines that the signature determination result is successful, and then calculates h A =H(r||Sig S ||M||T||PID S ||PID R ||PID A ) and generate a signature Then, the arbiter transmits the signature judgment result and Sig A to the second client C 2 . 如請求項3所述之電子簽章驗證系統,其中該認證中心端傳送RR以及至該第二客戶端C2,該第二客戶端C2藉由該加密金鑰解密RR來獲得,接著,該第二客戶端C2計算訊息h R ′=H(r||SigS||M||T||PIDS||PIDR||PIDA),該第二客戶端C2計算訊息 ,以及比較以及,當比較 結果為符合時,即可確認為來自該仲裁者端之訊息。 The electronic signature verification system of claim 3, wherein the authentication center transmits R R and Up to the second client C 2 , the second client C 2 by the encryption key Decrypt R R to get Next, the second client C 2 calculates a message h R '=H(r||Sig S ||M||T||PID S ||PID R ||PID A ), the second client C 2 Calculation message And compare as well as When the comparison result is met, it can be confirmed as the message from the arbiter. 如請求項1所述之電子簽章驗證系統,其中該第一客戶端與該仲裁者端之間為連線狀態時,該簽章係由該第一客戶端傳送給該仲裁者端。 The electronic signature verification system of claim 1, wherein the signature is between the first client and the arbitrator. It is transmitted by the first client to the arbiter. 如請求項1所述之電子簽章驗證系統,其中該第一客戶端與該仲裁者端之間為離線狀態時,該簽章係由該第一客戶端經由該第二客戶端傳送給該仲裁者端。 The electronic signature verification system of claim 1, wherein the signature is when the first client and the arbitrator are offline. The first client transmits to the arbiter via the second client. 一種電子簽章驗證系統,用於驗證第一客戶端C1與第二客戶端C2間之簽章SIGS,其中該簽章SIGS係由該第一客戶端C1使用簽章金鑰對第一訊息h進行加密所產生,電子簽章驗證系統包含:認證中心端,接收來自該第二客戶端C2傳送簽章端隨機虛擬身份識別資訊PIDS、簽章接收端隨機虛擬身份識別資訊PIDR、以及該簽章SIGS,該認證中心端更藉由PIDS之簽章金鑰對該簽章SigS解密以獲得hS= ,該認證中心端更產生會話金鑰SKR並計算 ,並藉由PIDR的加密金鑰計算, 又傳送訊息RR以及訊息給該第二客戶端C2;其中,該第二客戶端C2接收到來該自認證中心端之資訊後,藉由加密金鑰解密RR來獲得,並計算訊息h R '=H(M||PIDS||PID R ||RID S ||T), 以及計算訊息,並比較以及 ,當比較結果為符合時,即可確認為來自該第一客戶端C1之訊息。 An electronic signature verification system for verifying a signature SIG S between a first client C 1 and a second client C 2 , wherein the signature SIG S is used by the first client C 1 to use a signature key The first message h is encrypted. The electronic signature verification system includes: an authentication center end, receiving a random virtual identification information PID S from the second client C 2, and a random virtual identification of the signature receiving end. The information PID R and the signature SIG S , the certification center decrypts the signature Sig S by the signature key of the PID S to obtain h S = The authentication center further generates a session key SK R and calculates And calculated by the encryption key of PID R , and send the message R R and the message Giving the second client C 2 ; wherein the second client C 2 receives the information from the self-certification center, by using the encryption key Decrypt R R to get And calculate the message h R ' =H(M||PID S || PID R || RID S || T ), and calculate the message And compare as well as When the comparison result is met, to confirm the end of the message from the first client C of 1.
TW105111306A 2016-04-12 2016-04-12 Electronic signature verification system TWI599909B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW105111306A TWI599909B (en) 2016-04-12 2016-04-12 Electronic signature verification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW105111306A TWI599909B (en) 2016-04-12 2016-04-12 Electronic signature verification system

Publications (2)

Publication Number Publication Date
TWI599909B TWI599909B (en) 2017-09-21
TW201737152A true TW201737152A (en) 2017-10-16

Family

ID=60719326

Family Applications (1)

Application Number Title Priority Date Filing Date
TW105111306A TWI599909B (en) 2016-04-12 2016-04-12 Electronic signature verification system

Country Status (1)

Country Link
TW (1) TWI599909B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108235311A (en) * 2017-12-29 2018-06-29 东信和平科技股份有限公司 A kind of method, apparatus of push/reception identifying code and identifying code sending system
CN114079568B (en) * 2020-07-30 2023-12-12 庄连豪 Information transmission encryption protection method and implementation system thereof

Also Published As

Publication number Publication date
TWI599909B (en) 2017-09-21

Similar Documents

Publication Publication Date Title
US11757662B2 (en) Confidential authentication and provisioning
EP3642997B1 (en) Secure communications providing forward secrecy
US10015159B2 (en) Terminal authentication system, server device, and terminal authentication method
CN104683112B (en) A kind of car car safety communicating method that certification is assisted based on RSU
KR20160099922A (en) Method, apparatus and computer program for issuing user certificate and verifying user
US9692770B2 (en) Signature verification using unidirectional function
KR20110083886A (en) Apparatus and method for other portable terminal authentication in portable terminal
JP2017163612A (en) Terminal authentication system, server device, and terminal authentication method
WO2016173211A1 (en) Application identifier management method and device
TWI599909B (en) Electronic signature verification system
CN114697038A (en) Quantum attack resistant electronic signature method and system
EP3361670B1 (en) Multi-ttp-based method and device for verifying validity of identity of entity
CN110572257A (en) Anti-quantum computing data source identification method and system based on identity
CN112533213B (en) Key negotiation method, device, terminal and storage medium
TWI614637B (en) Method and system for chaging information using near field communication
WO2022229971A1 (en) System and method for collective trust identity and authentication
CN114240428A (en) Data transmission method and device, data transaction terminal and data supplier

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees