CN112243011A - Signature verification method, system, electronic equipment and storage medium - Google Patents
Signature verification method, system, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN112243011A CN112243011A CN202011511924.XA CN202011511924A CN112243011A CN 112243011 A CN112243011 A CN 112243011A CN 202011511924 A CN202011511924 A CN 202011511924A CN 112243011 A CN112243011 A CN 112243011A
- Authority
- CN
- China
- Prior art keywords
- identity information
- user identity
- message
- transmitted
- bit string
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a signature verification method, a system, an electronic device and a storage medium, wherein the method comprises the following steps: mapping the length of the user identity information and the length of the message to be transmitted to a preset range length by using corresponding hash functions; generating a specific parameter based on the cyclic group; generating a user identity information key based on the user identity information bit string and the specific parameter, and verifying the authenticity of the key in an equality verification mode; and after the authenticity of the user identity information key is verified, generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameter, and verifying the signature data in an equation verification mode. The invention generates the specific parameter based on the cycle group, generates the key of the user identity information and the signature data of the message based on the specific parameter, and respectively verifies the key and the signature data through the bilinear pairwise equation, thereby improving the security of the user identity information and the message transmission.
Description
Technical Field
The present invention relates to the field of cryptography, and more particularly, to a signature verification method, system, electronic device, and storage medium.
Background
In the network data transmission process, the safety and reliability of data transmission are very important. When a user sends a message to another user, the security of the user's identity information and the security of the message to be transmitted is important.
At present, a certain encryption algorithm is usually adopted to encrypt user identity information of a user and a message to be transmitted, when the user on one side transmits the message to the user on the other side, the user on the other side decrypts the message, and the safety of data in the transmission process is ensured.
Since the user identity information of the user and the transmitted message are fixed and unchangeable, the security of data transmission is not high enough in this way.
Disclosure of Invention
Embodiments of the present invention provide a signature verification method, system, electronic device and storage medium that overcome the above-mentioned problems, or at least partially solve the above-mentioned problems.
According to a first aspect of the embodiments of the present invention, there is provided a signature verification method, including:
mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by using corresponding hash functions respectively;
generating specific parameters by using the cyclic group;
generating a user identity information key based on the user identity information bit string and the specific parameter, and performing authenticity verification on the user identity information key in an equality verification mode;
and after the authenticity of the user identity information key is verified, generating signature data of the message to be transmitted based on the message bit string to be transmitted and the specific parameter, and verifying the signature data of the message to be transmitted in an equation verification mode.
According to a second aspect of embodiments of the present invention, there is provided a signature verification system including:
the mapping module is used for mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by utilizing corresponding hash functions respectively;
the parameter generation module is used for generating specific parameters by utilizing the cyclic group;
the key generation module is used for generating a user identity information key based on the user identity information bit string and the specific parameter and verifying the authenticity of the user identity information key in an equality verification mode;
and the signature generation module is used for generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameter after the authenticity of the user identity information key is verified, and verifying the signature data of the message to be transmitted in an equation verification mode.
According to a third aspect of the embodiments of the present invention, there is provided an electronic device, including a memory, and a processor, where the processor is configured to implement the steps of the signature verification method when executing a computer management class program stored in the memory.
According to a fourth aspect of embodiments of the present invention, there is provided a computer-readable storage medium having stored thereon a computer management class program, which when executed by a processor, implements the steps of the signature verification method.
According to the signature verification method, the system, the electronic device and the storage medium provided by the embodiment of the invention, the specific parameter is generated based on the cyclic group, the key of the user identity information and the signature data of the message are generated based on the specific parameter, and the key and the signature data are respectively verified through the bilinear pair equation, so that the safety of the user identity information and the message transmission is improved.
Drawings
Fig. 1 is a flowchart of a signature verification method according to an embodiment of the present invention;
fig. 2 is an overall flowchart of a signature verification method according to an embodiment of the present invention;
FIG. 3 is a diagram of a signature verification system according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a hardware structure of a possible electronic device according to an embodiment of the present invention;
fig. 5 is a schematic hardware structure diagram of a possible computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
The following detailed description of embodiments of the present invention is provided in connection with the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
Before explaining the signature verification method provided by the embodiment of the present invention, a description is given of related concepts used by the embodiment of the present invention.
1. Bilinear Pairing (Bilinear Pairing), let G and GTA cyclic group of order q, q being a prime number, G being a generator of G, a bilinear map beingAnd satisfies the following properties:
(1) the double-linear characteristic is obtained by the following steps,for all ofA set consisting of positive integers less than q and the set contains no 0 elements.
(3) High efficiency of computability.
2. Difficult problem assumptions.
CDH (computational Diffie-Hellman) problem, let group G and group GTThe cyclic groups are of order q, q is a prime number, and G is a generator of G, then the CDH problem for cyclic group G is: optionallyWhereinNeed to calculate。
Suppose that: a group G is said to have a CDH problem if there is no probability polynomial algorithm that can solve the CDH problem with a probability of at least ε over time tIt is assumed to be true.
If the attacker Adv runs t times at most, q is carried out at mosteA secondary key challenge and qhThe secondary signature inquiry processes the above problems with probability advantage not less than epsilon, and the attacker Adv is called as interactive digital signature and identification systemThe attack of (1). Provided that it does not exist in the signature verification schemeIf the system is broken, the system is calledAnd (4) safety is achieved.
Fig. 1 is a flowchart of a signature verification method according to an embodiment of the present invention, and as shown in fig. 1, the method includes: mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by using corresponding hash functions respectively; generating specific parameters by using the cyclic group; generating a user identity information key based on the user identity information bit string and the specific parameter, and verifying the authenticity of the user identity information key in an equality verification mode; and after the authenticity of the user identity information key is verified, generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameter, and verifying the signature data of the message to be transmitted in an equation verification mode.
It can be understood that lengths of user identity information of different users and lengths of messages to be transmitted are different, and therefore, in the embodiment of the present invention, for user identity information and messages of any length, two collision-resistant hash functions are respectively designed, and the lengths of the user identity information of the user and the length of the message to be transmitted are mapped to a preset range length by using the corresponding hash functions, so as to generate a user identity information bit string and a message bit string (hereinafter referred to as a message bit string to be transmitted) of the preset range length. The hash function can be changed according to different time and different requirements, is not fixed and is changed randomly, so that the generated user identity information bit string and the message bit string to be transmitted are also random, and the safety of the user identity information and the message to be transmitted is improved.
And generating a specific parameter by using a cyclic group mode, calculating a secret key of the user identity information by using the generated specific parameter, and verifying the authenticity of the secret key of the user identity information. And after the authenticity of the user identity information key is verified, the signature data of the message is calculated by using the generated specific parameters, and the signature data is verified, so that the safety and reliability of the user identity information and the transmission message are ensured.
In a possible embodiment, mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with a preset range length by using corresponding hash functions respectively comprises: respectively configuring a collision-resistant hash function for the user identity information and the message to be transmitted; and mapping the user identity information and the message to be transmitted respectively by utilizing corresponding hash functions, mapping the length of the user identity information and the length of the message to be transmitted to a preset range length, and generating a user identity information bit string and a message bit string to be transmitted with the preset range length.
It will be appreciated that the user is required to subsequently generate the key and signature dataThe method comprises the steps of setting a collision-resistant hash function for original user identity information and a message to be transmitted, mapping the length of the original user identity information and the length of the message to be signed into a preset range length by using the collision-resistant hash function respectively, and generating a user identity information bit string and a message bit string to be transmitted with the preset range length after mapping, wherein the user identity information bit string and the message bit string to be transmitted are binary character strings of 0 and 1, and the length of the user identity information bit string is the same as the length of the message to be transmittedThe length of the bit string of the message to be transmitted being。
In one possible embodiment, the generating the specific parameter by using the cyclic group comprises: let G and GTEach of which is a cyclic group of order q, q being a prime number, G being a generator of G, there being a mapping;
Random selectionWherein, in the step (A),for sets consisting of positive integers less than q and sets containing no 0 elements, calculate;
Random selectionLength ofVector U = U, longDegree of rotationM = M, wherein,,for the length of the user identity information bit string,for the length of the bit string to be signed, order;
Wherein generating a user identity information key based on the user identity information bit string and the specific parameter comprises: for the length of the user identity information bit string uLet K be the set of positions in u for which the bit value is 1,(ii) a Random selectionCalculating the secret key d of the user identity informationu:
Wherein k is1Is a secret key duIs composed of tuples (k)1,k2) Composition k1Is a secret key duFirst password ofKey, and k2Is a secret key duThe second key of (2).
Correspondingly, the authenticity verification of the user identity information key by the following equation comprises:
if the equation is true, the key can be confirmed to be authentic; if the equation is not satisfied, a fail exit.
therefore:
after the authenticity verification of the secret key passes, generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameter comprises the following steps: the bit string m of the message to be transmitted is made to be a length ofLet H be the set of positions of bit value 1 in message m, then。
after the signature data of the message to be transmitted is generated, the authenticity of the signature data needs to be verified, and the authenticity of the signature data of the message to be transmitted can be verified through an equation:
through the verification process of the above formula, the equation verification process passes, and the verification mode is safe and feasible.
Referring to fig. 2, a detailed description is given of a signature verification method according to an embodiment of the present invention. Generating specific parameters by using the cyclic group, calculating the user identity information based on the generated specific parameters, generating a user identity information key of the user, verifying the authenticity of the user identity information key, calculating the signature data of the message to be transmitted by using the generated specific parameters after the authenticity verification of the user identity information key is passed, and verifying the authenticity of the signature data of the message to be transmitted. When the user identity key and the signature data of the message to be transmitted are verified, the user identity information key and the signature data of the message to be transmitted are verified respectively according to the bilinear pairing, and therefore verification efficiency is improved.
Fig. 3 is a structural diagram of a signature verification system according to an embodiment of the present invention, and as shown in fig. 3, the system includes a mapping module 301, a generating module 302, and a verifying module 303, where:
the mapping module 301 is configured to map the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted, where the user identity information and the message to be transmitted have preset range lengths, respectively, by using corresponding hash functions;
a generating module 302, configured to generate a specific parameter by using a cyclic group, and to generate a user identity information key based on the user identity information bit string and the specific parameter, and generate signature data of a message to be transmitted based on the message bit string to be transmitted and the specific parameter after the authenticity verification of the user identity information key passes;
the verification module 303 is configured to verify the authenticity of the user identity information key in an equation verification manner and verify the signature data of the message to be transmitted in the equation verification manner.
The embodiment of the present invention provides a signature verification system corresponding to the signature verification method provided above, and the relevant technical features of the signature verification system can refer to the relevant technical features of the signature verification methods of the foregoing embodiments, and will not be described again here.
Referring to fig. 4, fig. 4 is a schematic view of an embodiment of an electronic device according to an embodiment of the present disclosure. As shown in fig. 4, an electronic device according to an embodiment of the present application includes a memory 410, a processor 420, and a computer program 411 stored in the memory 420 and executable on the processor 420, where the processor 420 executes the computer program 411 to implement the following steps: mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by using corresponding hash functions respectively; generating specific parameters by using the cyclic group; generating a user identity information key based on the user identity information bit string and the specific parameter, and verifying the authenticity of the user identity information key in an equality verification mode; and after the authenticity of the user identity information key is verified, generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameter, and verifying the signature data of the message to be transmitted in an equation verification mode.
Referring to fig. 5, fig. 5 is a schematic diagram illustrating an embodiment of a computer-readable storage medium according to the present application. As shown in fig. 5, the present embodiment provides a computer-readable storage medium 500 having a computer program 511 stored thereon, the computer program 511 implementing the following steps when executed by a processor: mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by using corresponding hash functions respectively; generating specific parameters by using the cyclic group; generating a user identity information key based on the user identity information bit string and the specific parameter, and verifying the authenticity of the user identity information key in an equality verification mode; after the authenticity of the user identity information key is verified, generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameters, and verifying the signature data of the message to be transmitted in an equation verification mode.
It should be noted that, in the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to relevant descriptions of other embodiments for parts that are not described in detail in a certain embodiment.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to include such modifications and variations.
Claims (8)
1. A signature verification method, comprising:
mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by using corresponding hash functions respectively;
generating specific parameters by using the cyclic group;
generating a user identity information key based on the user identity information bit string and the specific parameter, and performing authenticity verification on the user identity information key in an equality verification mode;
and after the authenticity of the user identity information key is verified, generating signature data of the message to be transmitted based on the message bit string to be transmitted and the specific parameter, and verifying the signature data of the message to be transmitted in an equation verification mode.
2. The signature verification method according to claim 1, wherein the mapping the user identity information and the message to be transmitted into the user identity information bit string and the message bit string to be transmitted with the preset range length by using the corresponding hash functions respectively comprises:
respectively configuring a collision-resistant hash function for the user identity information and the message to be transmitted;
and mapping the user identity information and the message to be transmitted respectively by utilizing corresponding hash functions, mapping the length of the user identity information and the length of the message to be transmitted to a preset range length, and generating a user identity information bit string and a message bit string to be transmitted with the preset range length.
3. The signature verification method of claim 1, wherein the generating specific parameters using a cyclic group comprises:
let G and GTEach of which is a cyclic group of order q, q being a prime number, G being a generator of G, there being a mapping;
Random selectionWherein, in the step (A),for sets consisting of positive integers less than q and sets containing no 0 elements, calculate;
Random selectionLength ofVector U = U, lengthM = M, wherein,,for the length of the user identity information bit string,for the length of the bit string to be signed, order;
4. The signature verification method according to claim 3, wherein the generating the user identity information key based on the user identity information bit string and the specific parameter includes:
for the length of the user identity information bit string uLet K be the set of positions in u for which the bit value is 1,;
Wherein k is1Is a secret key duIs composed of tuples (k)1,k2) Composition k1Is a secret key duK is a first key of2Is a secret key duThe second key of (2);
correspondingly, the authenticity verification of the user identity information key by the following equation comprises:
5. the signature verification method according to claim 4, wherein the generating signature data of the message to be transmitted based on the message bit string to be transmitted and the specific parameter comprises:
the bit string m of the message to be transmitted is made to be a length ofLet H be the set of positions of bit value 1 in message m, then;
correspondingly, the signature data of the message to be transmitted is verified by the following equation:
6. a signature verification system, comprising:
the mapping module is used for mapping the user identity information and the message to be transmitted into a user identity information bit string and a message bit string to be transmitted with preset range lengths by utilizing corresponding hash functions;
the parameter generation module is used for generating specific parameters by utilizing the cyclic group;
the key generation module is used for generating a user identity information key based on the user identity information bit string and the specific parameter and verifying the authenticity of the user identity information key in an equality verification mode;
and the signature generation module is used for generating signature data of the message to be transmitted based on the bit string of the message to be transmitted and the specific parameter after the authenticity of the user identity information key is verified, and verifying the signature data of the message to be transmitted in an equation verification mode.
7. An electronic device comprising a memory, a processor for implementing the steps of the signature verification method of any one of claims 1-5 when executing a computer management class program stored in the memory.
8. A computer-readable storage medium, having stored thereon a computer management class program, which when executed by a processor, carries out the steps of the signature verification method as claimed in any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011511924.XA CN112243011A (en) | 2020-12-18 | 2020-12-18 | Signature verification method, system, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011511924.XA CN112243011A (en) | 2020-12-18 | 2020-12-18 | Signature verification method, system, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112243011A true CN112243011A (en) | 2021-01-19 |
Family
ID=74175367
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011511924.XA Pending CN112243011A (en) | 2020-12-18 | 2020-12-18 | Signature verification method, system, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112243011A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115022820A (en) * | 2022-05-31 | 2022-09-06 | 微位(深圳)网络科技有限公司 | 5G message verification method, terminal and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101562524A (en) * | 2009-05-31 | 2009-10-21 | 河海大学 | Digital signature method based on identity |
US20180048629A1 (en) * | 2016-08-13 | 2018-02-15 | Saadeldin (Dean) El-Sedfy | Expression and Method to Send and Receive Text Messages Encrypted For The Targeted Receiving User to Render Eavesdropping Useless. |
CN110768799A (en) * | 2019-12-30 | 2020-02-07 | 中国银联股份有限公司 | Digital signature method, device, equipment, medium and system |
US20200313911A1 (en) * | 2019-03-25 | 2020-10-01 | Micron Technology, Inc. | Generating an identity for a computing device using a physical unclonable function |
-
2020
- 2020-12-18 CN CN202011511924.XA patent/CN112243011A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101562524A (en) * | 2009-05-31 | 2009-10-21 | 河海大学 | Digital signature method based on identity |
US20180048629A1 (en) * | 2016-08-13 | 2018-02-15 | Saadeldin (Dean) El-Sedfy | Expression and Method to Send and Receive Text Messages Encrypted For The Targeted Receiving User to Render Eavesdropping Useless. |
US20200313911A1 (en) * | 2019-03-25 | 2020-10-01 | Micron Technology, Inc. | Generating an identity for a computing device using a physical unclonable function |
CN110768799A (en) * | 2019-12-30 | 2020-02-07 | 中国银联股份有限公司 | Digital signature method, device, equipment, medium and system |
Non-Patent Citations (1)
Title |
---|
谷科等: "高效安全的基于身份的签名方案", 《软件学报》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115022820A (en) * | 2022-05-31 | 2022-09-06 | 微位(深圳)网络科技有限公司 | 5G message verification method, terminal and system |
CN115022820B (en) * | 2022-05-31 | 2023-11-14 | 微位(深圳)网络科技有限公司 | Verification method, terminal and system of 5G message |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107579819B (en) | A kind of SM9 digital signature generation method and system | |
CN108885741B (en) | Tokenization method and system for realizing exchange on block chain | |
EP3069249B1 (en) | Authenticatable device | |
CN113364576B (en) | Data encryption evidence storing and sharing method based on block chain | |
CA2976795C (en) | Implicitly certified digital signatures | |
US10148422B2 (en) | Implicitly certified public keys | |
CA2792575A1 (en) | Multiple hashing in a cryptographic scheme | |
CN112446052B (en) | Aggregated signature method and system suitable for secret-related information system | |
CN109861956B (en) | Data verification system, method, device and equipment based on state channel | |
CN113704736A (en) | Lightweight access authentication method and system for power Internet of things equipment based on IBC system | |
CN111147245A (en) | Algorithm for encrypting by using national password in block chain | |
CN110351297B (en) | Verification method and device applied to block chain | |
CN114049121B (en) | Block chain based account resetting method and equipment | |
Yu et al. | Identity‐Based Proxy Signcryption Protocol with Universal Composability | |
CN114448641A (en) | Privacy encryption method, electronic equipment, storage medium and chip | |
CN109766716A (en) | A kind of anonymous bidirectional authentication method based on trust computing | |
CN112243011A (en) | Signature verification method, system, electronic equipment and storage medium | |
CN112487464A (en) | Encrypted data sharing method and device based on block chain | |
CN108667619B (en) | White box implementation method and device for SM9 digital signature | |
US11616994B2 (en) | Embedding information in elliptic curve base point | |
CN113362065A (en) | Online signature transaction implementation method based on distributed private key | |
US20140189361A1 (en) | Nformation processing apparatus, signature generation apparatus, information processing method, signature generation method, and program | |
CN112837064A (en) | Signature method, signature verification method and device of alliance chain | |
CN112715017A (en) | Cryptographic key configuration using physically unclonable functions | |
CN111339549A (en) | Block chain key escrow method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210119 |
|
RJ01 | Rejection of invention patent application after publication |