CN112243011A - Signature verification method, system, electronic equipment and storage medium - Google Patents

Signature verification method, system, electronic equipment and storage medium Download PDF

Info

Publication number
CN112243011A
CN112243011A CN202011511924.XA CN202011511924A CN112243011A CN 112243011 A CN112243011 A CN 112243011A CN 202011511924 A CN202011511924 A CN 202011511924A CN 112243011 A CN112243011 A CN 112243011A
Authority
CN
China
Prior art keywords
identity information
user identity
message
transmitted
bit string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011511924.XA
Other languages
Chinese (zh)
Inventor
易鹏
吴建得
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dfwee Technology Ltd
Original Assignee
Dfwee Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dfwee Technology Ltd filed Critical Dfwee Technology Ltd
Priority to CN202011511924.XA priority Critical patent/CN112243011A/en
Publication of CN112243011A publication Critical patent/CN112243011A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a signature verification method, a system, an electronic device and a storage medium, wherein the method comprises the following steps: mapping the length of the user identity information and the length of the message to be transmitted to a preset range length by using corresponding hash functions; generating a specific parameter based on the cyclic group; generating a user identity information key based on the user identity information bit string and the specific parameter, and verifying the authenticity of the key in an equality verification mode; and after the authenticity of the user identity information key is verified, generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameter, and verifying the signature data in an equation verification mode. The invention generates the specific parameter based on the cycle group, generates the key of the user identity information and the signature data of the message based on the specific parameter, and respectively verifies the key and the signature data through the bilinear pairwise equation, thereby improving the security of the user identity information and the message transmission.

Description

Signature verification method, system, electronic equipment and storage medium
Technical Field
The present invention relates to the field of cryptography, and more particularly, to a signature verification method, system, electronic device, and storage medium.
Background
In the network data transmission process, the safety and reliability of data transmission are very important. When a user sends a message to another user, the security of the user's identity information and the security of the message to be transmitted is important.
At present, a certain encryption algorithm is usually adopted to encrypt user identity information of a user and a message to be transmitted, when the user on one side transmits the message to the user on the other side, the user on the other side decrypts the message, and the safety of data in the transmission process is ensured.
Since the user identity information of the user and the transmitted message are fixed and unchangeable, the security of data transmission is not high enough in this way.
Disclosure of Invention
Embodiments of the present invention provide a signature verification method, system, electronic device and storage medium that overcome the above-mentioned problems, or at least partially solve the above-mentioned problems.
According to a first aspect of the embodiments of the present invention, there is provided a signature verification method, including:
mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by using corresponding hash functions respectively;
generating specific parameters by using the cyclic group;
generating a user identity information key based on the user identity information bit string and the specific parameter, and performing authenticity verification on the user identity information key in an equality verification mode;
and after the authenticity of the user identity information key is verified, generating signature data of the message to be transmitted based on the message bit string to be transmitted and the specific parameter, and verifying the signature data of the message to be transmitted in an equation verification mode.
According to a second aspect of embodiments of the present invention, there is provided a signature verification system including:
the mapping module is used for mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by utilizing corresponding hash functions respectively;
the parameter generation module is used for generating specific parameters by utilizing the cyclic group;
the key generation module is used for generating a user identity information key based on the user identity information bit string and the specific parameter and verifying the authenticity of the user identity information key in an equality verification mode;
and the signature generation module is used for generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameter after the authenticity of the user identity information key is verified, and verifying the signature data of the message to be transmitted in an equation verification mode.
According to a third aspect of the embodiments of the present invention, there is provided an electronic device, including a memory, and a processor, where the processor is configured to implement the steps of the signature verification method when executing a computer management class program stored in the memory.
According to a fourth aspect of embodiments of the present invention, there is provided a computer-readable storage medium having stored thereon a computer management class program, which when executed by a processor, implements the steps of the signature verification method.
According to the signature verification method, the system, the electronic device and the storage medium provided by the embodiment of the invention, the specific parameter is generated based on the cyclic group, the key of the user identity information and the signature data of the message are generated based on the specific parameter, and the key and the signature data are respectively verified through the bilinear pair equation, so that the safety of the user identity information and the message transmission is improved.
Drawings
Fig. 1 is a flowchart of a signature verification method according to an embodiment of the present invention;
fig. 2 is an overall flowchart of a signature verification method according to an embodiment of the present invention;
FIG. 3 is a diagram of a signature verification system according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a hardware structure of a possible electronic device according to an embodiment of the present invention;
fig. 5 is a schematic hardware structure diagram of a possible computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
The following detailed description of embodiments of the present invention is provided in connection with the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
Before explaining the signature verification method provided by the embodiment of the present invention, a description is given of related concepts used by the embodiment of the present invention.
1. Bilinear Pairing (Bilinear Pairing), let G and GTA cyclic group of order q, q being a prime number, G being a generator of G, a bilinear map being
Figure 661100DEST_PATH_IMAGE001
And satisfies the following properties:
(1) the double-linear characteristic is obtained by the following steps,
Figure 380925DEST_PATH_IMAGE002
for all of
Figure 598280DEST_PATH_IMAGE003
A set consisting of positive integers less than q and the set contains no 0 elements.
(2) Non-degradability, i.e.
Figure 602008DEST_PATH_IMAGE004
(3) High efficiency of computability.
2. Difficult problem assumptions.
CDH (computational Diffie-Hellman) problem, let group G and group GTThe cyclic groups are of order q, q is a prime number, and G is a generator of G, then the CDH problem for cyclic group G is: optionally
Figure 715457DEST_PATH_IMAGE005
Wherein
Figure 450808DEST_PATH_IMAGE006
Need to calculate
Figure 206274DEST_PATH_IMAGE007
Figure 64509DEST_PATH_IMAGE008
Suppose that: a group G is said to have a CDH problem if there is no probability polynomial algorithm that can solve the CDH problem with a probability of at least ε over time t
Figure 427488DEST_PATH_IMAGE008
It is assumed to be true.
If the attacker Adv runs t times at most, q is carried out at mosteA secondary key challenge and qhThe secondary signature inquiry processes the above problems with probability advantage not less than epsilon, and the attacker Adv is called as interactive digital signature and identification system
Figure 105594DEST_PATH_IMAGE009
The attack of (1). Provided that it does not exist in the signature verification scheme
Figure 399172DEST_PATH_IMAGE010
If the system is broken, the system is called
Figure 393804DEST_PATH_IMAGE011
And (4) safety is achieved.
Fig. 1 is a flowchart of a signature verification method according to an embodiment of the present invention, and as shown in fig. 1, the method includes: mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by using corresponding hash functions respectively; generating specific parameters by using the cyclic group; generating a user identity information key based on the user identity information bit string and the specific parameter, and verifying the authenticity of the user identity information key in an equality verification mode; and after the authenticity of the user identity information key is verified, generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameter, and verifying the signature data of the message to be transmitted in an equation verification mode.
It can be understood that lengths of user identity information of different users and lengths of messages to be transmitted are different, and therefore, in the embodiment of the present invention, for user identity information and messages of any length, two collision-resistant hash functions are respectively designed, and the lengths of the user identity information of the user and the length of the message to be transmitted are mapped to a preset range length by using the corresponding hash functions, so as to generate a user identity information bit string and a message bit string (hereinafter referred to as a message bit string to be transmitted) of the preset range length. The hash function can be changed according to different time and different requirements, is not fixed and is changed randomly, so that the generated user identity information bit string and the message bit string to be transmitted are also random, and the safety of the user identity information and the message to be transmitted is improved.
And generating a specific parameter by using a cyclic group mode, calculating a secret key of the user identity information by using the generated specific parameter, and verifying the authenticity of the secret key of the user identity information. And after the authenticity of the user identity information key is verified, the signature data of the message is calculated by using the generated specific parameters, and the signature data is verified, so that the safety and reliability of the user identity information and the transmission message are ensured.
In a possible embodiment, mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with a preset range length by using corresponding hash functions respectively comprises: respectively configuring a collision-resistant hash function for the user identity information and the message to be transmitted; and mapping the user identity information and the message to be transmitted respectively by utilizing corresponding hash functions, mapping the length of the user identity information and the length of the message to be transmitted to a preset range length, and generating a user identity information bit string and a message bit string to be transmitted with the preset range length.
It will be appreciated that the user is required to subsequently generate the key and signature dataThe method comprises the steps of setting a collision-resistant hash function for original user identity information and a message to be transmitted, mapping the length of the original user identity information and the length of the message to be signed into a preset range length by using the collision-resistant hash function respectively, and generating a user identity information bit string and a message bit string to be transmitted with the preset range length after mapping, wherein the user identity information bit string and the message bit string to be transmitted are binary character strings of 0 and 1, and the length of the user identity information bit string is the same as the length of the message to be transmitted
Figure 176952DEST_PATH_IMAGE012
The length of the bit string of the message to be transmitted being
Figure 889824DEST_PATH_IMAGE013
In one possible embodiment, the generating the specific parameter by using the cyclic group comprises: let G and GTEach of which is a cyclic group of order q, q being a prime number, G being a generator of G, there being a mapping
Figure 987093DEST_PATH_IMAGE014
Random selection
Figure 757603DEST_PATH_IMAGE015
Wherein, in the step (A),
Figure 459456DEST_PATH_IMAGE016
for sets consisting of positive integers less than q and sets containing no 0 elements, calculate
Figure 377733DEST_PATH_IMAGE017
Random selection
Figure 13114DEST_PATH_IMAGE018
Length of
Figure 700447DEST_PATH_IMAGE019
Vector U = U, longDegree of rotation
Figure 779393DEST_PATH_IMAGE020
M = M, wherein,
Figure 122649DEST_PATH_IMAGE021
Figure 827300DEST_PATH_IMAGE019
for the length of the user identity information bit string,
Figure 369140DEST_PATH_IMAGE020
for the length of the bit string to be signed, order
Figure 868254DEST_PATH_IMAGE022
Determining a specific parameter as
Figure 246277DEST_PATH_IMAGE023
Wherein generating a user identity information key based on the user identity information bit string and the specific parameter comprises: for the length of the user identity information bit string u
Figure 223460DEST_PATH_IMAGE019
Let K be the set of positions in u for which the bit value is 1,
Figure 885386DEST_PATH_IMAGE024
(ii) a Random selection
Figure 820981DEST_PATH_IMAGE025
Calculating the secret key d of the user identity informationu
Figure 686300DEST_PATH_IMAGE026
Wherein k is1Is a secret key duIs composed of tuples (k)1,k2) Composition k1Is a secret key duFirst password ofKey, and k2Is a secret key duThe second key of (2).
Correspondingly, the authenticity verification of the user identity information key by the following equation comprises:
Figure 467174DEST_PATH_IMAGE027
if the equation is true, the key can be confirmed to be authentic; if the equation is not satisfied, a fail exit.
Because:
Figure 186868DEST_PATH_IMAGE028
Figure 293365DEST_PATH_IMAGE029
therefore:
Figure 895247DEST_PATH_IMAGE030
after the authenticity verification of the secret key passes, generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameter comprises the following steps: the bit string m of the message to be transmitted is made to be a length of
Figure 683075DEST_PATH_IMAGE020
Let H be the set of positions of bit value 1 in message m, then
Figure 610272DEST_PATH_IMAGE031
Random selection
Figure 887670DEST_PATH_IMAGE032
Calculating signature data σ of the message to be transmitted:
Figure 258740DEST_PATH_IMAGE033
after the signature data of the message to be transmitted is generated, the authenticity of the signature data needs to be verified, and the authenticity of the signature data of the message to be transmitted can be verified through an equation:
Figure 850258DEST_PATH_IMAGE034
because:
Figure 341282DEST_PATH_IMAGE035
Figure 524002DEST_PATH_IMAGE036
therefore:
Figure 303739DEST_PATH_IMAGE037
Figure 980839DEST_PATH_IMAGE038
Figure 388687DEST_PATH_IMAGE039
Figure 493040DEST_PATH_IMAGE040
through the verification process of the above formula, the equation verification process passes, and the verification mode is safe and feasible.
Referring to fig. 2, a detailed description is given of a signature verification method according to an embodiment of the present invention. Generating specific parameters by using the cyclic group, calculating the user identity information based on the generated specific parameters, generating a user identity information key of the user, verifying the authenticity of the user identity information key, calculating the signature data of the message to be transmitted by using the generated specific parameters after the authenticity verification of the user identity information key is passed, and verifying the authenticity of the signature data of the message to be transmitted. When the user identity key and the signature data of the message to be transmitted are verified, the user identity information key and the signature data of the message to be transmitted are verified respectively according to the bilinear pairing, and therefore verification efficiency is improved.
Fig. 3 is a structural diagram of a signature verification system according to an embodiment of the present invention, and as shown in fig. 3, the system includes a mapping module 301, a generating module 302, and a verifying module 303, where:
the mapping module 301 is configured to map the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted, where the user identity information and the message to be transmitted have preset range lengths, respectively, by using corresponding hash functions;
a generating module 302, configured to generate a specific parameter by using a cyclic group, and to generate a user identity information key based on the user identity information bit string and the specific parameter, and generate signature data of a message to be transmitted based on the message bit string to be transmitted and the specific parameter after the authenticity verification of the user identity information key passes;
the verification module 303 is configured to verify the authenticity of the user identity information key in an equation verification manner and verify the signature data of the message to be transmitted in the equation verification manner.
The embodiment of the present invention provides a signature verification system corresponding to the signature verification method provided above, and the relevant technical features of the signature verification system can refer to the relevant technical features of the signature verification methods of the foregoing embodiments, and will not be described again here.
Referring to fig. 4, fig. 4 is a schematic view of an embodiment of an electronic device according to an embodiment of the present disclosure. As shown in fig. 4, an electronic device according to an embodiment of the present application includes a memory 410, a processor 420, and a computer program 411 stored in the memory 420 and executable on the processor 420, where the processor 420 executes the computer program 411 to implement the following steps: mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by using corresponding hash functions respectively; generating specific parameters by using the cyclic group; generating a user identity information key based on the user identity information bit string and the specific parameter, and verifying the authenticity of the user identity information key in an equality verification mode; and after the authenticity of the user identity information key is verified, generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameter, and verifying the signature data of the message to be transmitted in an equation verification mode.
Referring to fig. 5, fig. 5 is a schematic diagram illustrating an embodiment of a computer-readable storage medium according to the present application. As shown in fig. 5, the present embodiment provides a computer-readable storage medium 500 having a computer program 511 stored thereon, the computer program 511 implementing the following steps when executed by a processor: mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by using corresponding hash functions respectively; generating specific parameters by using the cyclic group; generating a user identity information key based on the user identity information bit string and the specific parameter, and verifying the authenticity of the user identity information key in an equality verification mode; after the authenticity of the user identity information key is verified, generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameters, and verifying the signature data of the message to be transmitted in an equation verification mode.
It should be noted that, in the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to relevant descriptions of other embodiments for parts that are not described in detail in a certain embodiment.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to include such modifications and variations.

Claims (8)

1. A signature verification method, comprising:
mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by using corresponding hash functions respectively;
generating specific parameters by using the cyclic group;
generating a user identity information key based on the user identity information bit string and the specific parameter, and performing authenticity verification on the user identity information key in an equality verification mode;
and after the authenticity of the user identity information key is verified, generating signature data of the message to be transmitted based on the message bit string to be transmitted and the specific parameter, and verifying the signature data of the message to be transmitted in an equation verification mode.
2. The signature verification method according to claim 1, wherein the mapping the user identity information and the message to be transmitted into the user identity information bit string and the message bit string to be transmitted with the preset range length by using the corresponding hash functions respectively comprises:
respectively configuring a collision-resistant hash function for the user identity information and the message to be transmitted;
and mapping the user identity information and the message to be transmitted respectively by utilizing corresponding hash functions, mapping the length of the user identity information and the length of the message to be transmitted to a preset range length, and generating a user identity information bit string and a message bit string to be transmitted with the preset range length.
3. The signature verification method of claim 1, wherein the generating specific parameters using a cyclic group comprises:
let G and GTEach of which is a cyclic group of order q, q being a prime number, G being a generator of G, there being a mapping
Figure 661591DEST_PATH_IMAGE001
Random selection
Figure 741542DEST_PATH_IMAGE002
Wherein, in the step (A),
Figure 95163DEST_PATH_IMAGE003
for sets consisting of positive integers less than q and sets containing no 0 elements, calculate
Figure 440825DEST_PATH_IMAGE004
Random selection
Figure 374146DEST_PATH_IMAGE005
Length of
Figure 574183DEST_PATH_IMAGE006
Vector U = U, length
Figure 364285DEST_PATH_IMAGE007
M = M, wherein,
Figure 853035DEST_PATH_IMAGE008
Figure 386784DEST_PATH_IMAGE006
for the length of the user identity information bit string,
Figure 192060DEST_PATH_IMAGE007
for the length of the bit string to be signed, order
Figure 356326DEST_PATH_IMAGE009
Determining a specific parameter as
Figure 129109DEST_PATH_IMAGE010
4. The signature verification method according to claim 3, wherein the generating the user identity information key based on the user identity information bit string and the specific parameter includes:
for the length of the user identity information bit string u
Figure 200971DEST_PATH_IMAGE006
Let K be the set of positions in u for which the bit value is 1,
Figure 578862DEST_PATH_IMAGE011
random selection
Figure 710766DEST_PATH_IMAGE012
Calculating the secret key d of the user identity informationu
Figure 730368DEST_PATH_IMAGE013
Wherein k is1Is a secret key duIs composed of tuples (k)1,k2) Composition k1Is a secret key duK is a first key of2Is a secret key duThe second key of (2);
correspondingly, the authenticity verification of the user identity information key by the following equation comprises:
Figure 543603DEST_PATH_IMAGE014
5. the signature verification method according to claim 4, wherein the generating signature data of the message to be transmitted based on the message bit string to be transmitted and the specific parameter comprises:
the bit string m of the message to be transmitted is made to be a length of
Figure 572739DEST_PATH_IMAGE007
Let H be the set of positions of bit value 1 in message m, then
Figure 609965DEST_PATH_IMAGE015
Random selection
Figure 622921DEST_PATH_IMAGE016
And calculating a signature sigma:
Figure 787317DEST_PATH_IMAGE017
correspondingly, the signature data of the message to be transmitted is verified by the following equation:
Figure 874222DEST_PATH_IMAGE018
6. a signature verification system, comprising:
the mapping module is used for mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by utilizing corresponding hash functions;
the parameter generation module is used for generating specific parameters by utilizing the cyclic group;
the key generation module is used for generating a user identity information key based on the user identity information bit string and the specific parameter and verifying the authenticity of the user identity information key in an equality verification mode;
and the signature generation module is used for generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameter after the authenticity of the user identity information key is verified, and verifying the signature data of the message to be transmitted in an equation verification mode.
7. An electronic device comprising a memory, a processor for implementing the steps of the signature verification method of any one of claims 1-5 when executing a computer management class program stored in the memory.
8. A computer-readable storage medium, having stored thereon a computer management class program, which when executed by a processor, carries out the steps of the signature verification method as claimed in any one of claims 1 to 5.
CN202011511924.XA 2020-12-18 2020-12-18 Signature verification method, system, electronic equipment and storage medium Pending CN112243011A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011511924.XA CN112243011A (en) 2020-12-18 2020-12-18 Signature verification method, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011511924.XA CN112243011A (en) 2020-12-18 2020-12-18 Signature verification method, system, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112243011A true CN112243011A (en) 2021-01-19

Family

ID=74175367

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011511924.XA Pending CN112243011A (en) 2020-12-18 2020-12-18 Signature verification method, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112243011A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022820A (en) * 2022-05-31 2022-09-06 微位(深圳)网络科技有限公司 5G message verification method, terminal and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562524A (en) * 2009-05-31 2009-10-21 河海大学 Digital signature method based on identity
US20180048629A1 (en) * 2016-08-13 2018-02-15 Saadeldin (Dean) El-Sedfy Expression and Method to Send and Receive Text Messages Encrypted For The Targeted Receiving User to Render Eavesdropping Useless.
CN110768799A (en) * 2019-12-30 2020-02-07 中国银联股份有限公司 Digital signature method, device, equipment, medium and system
US20200313911A1 (en) * 2019-03-25 2020-10-01 Micron Technology, Inc. Generating an identity for a computing device using a physical unclonable function

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562524A (en) * 2009-05-31 2009-10-21 河海大学 Digital signature method based on identity
US20180048629A1 (en) * 2016-08-13 2018-02-15 Saadeldin (Dean) El-Sedfy Expression and Method to Send and Receive Text Messages Encrypted For The Targeted Receiving User to Render Eavesdropping Useless.
US20200313911A1 (en) * 2019-03-25 2020-10-01 Micron Technology, Inc. Generating an identity for a computing device using a physical unclonable function
CN110768799A (en) * 2019-12-30 2020-02-07 中国银联股份有限公司 Digital signature method, device, equipment, medium and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
谷科等: "高效安全的基于身份的签名方案", 《软件学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022820A (en) * 2022-05-31 2022-09-06 微位(深圳)网络科技有限公司 5G message verification method, terminal and system
CN115022820B (en) * 2022-05-31 2023-11-14 微位(深圳)网络科技有限公司 Verification method, terminal and system of 5G message

Similar Documents

Publication Publication Date Title
CN107579819B (en) A kind of SM9 digital signature generation method and system
CN108885741B (en) Tokenization method and system for realizing exchange on block chain
EP3069249B1 (en) Authenticatable device
CN113364576B (en) Data encryption evidence storing and sharing method based on block chain
CA2976795C (en) Implicitly certified digital signatures
US10148422B2 (en) Implicitly certified public keys
CA2792575A1 (en) Multiple hashing in a cryptographic scheme
CN112446052B (en) Aggregated signature method and system suitable for secret-related information system
CN109861956B (en) Data verification system, method, device and equipment based on state channel
CN113704736A (en) Lightweight access authentication method and system for power Internet of things equipment based on IBC system
CN111147245A (en) Algorithm for encrypting by using national password in block chain
CN110351297B (en) Verification method and device applied to block chain
CN114049121B (en) Block chain based account resetting method and equipment
Yu et al. Identity‐Based Proxy Signcryption Protocol with Universal Composability
CN114448641A (en) Privacy encryption method, electronic equipment, storage medium and chip
CN109766716A (en) A kind of anonymous bidirectional authentication method based on trust computing
CN112243011A (en) Signature verification method, system, electronic equipment and storage medium
CN112487464A (en) Encrypted data sharing method and device based on block chain
CN108667619B (en) White box implementation method and device for SM9 digital signature
US11616994B2 (en) Embedding information in elliptic curve base point
CN113362065A (en) Online signature transaction implementation method based on distributed private key
US20140189361A1 (en) Nformation processing apparatus, signature generation apparatus, information processing method, signature generation method, and program
CN112837064A (en) Signature method, signature verification method and device of alliance chain
CN112715017A (en) Cryptographic key configuration using physically unclonable functions
CN111339549A (en) Block chain key escrow method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210119

RJ01 Rejection of invention patent application after publication