JPS6177440A - Signature document communication system - Google Patents
Signature document communication systemInfo
- Publication number
- JPS6177440A JPS6177440A JP59199179A JP19917984A JPS6177440A JP S6177440 A JPS6177440 A JP S6177440A JP 59199179 A JP59199179 A JP 59199179A JP 19917984 A JP19917984 A JP 19917984A JP S6177440 A JPS6177440 A JP S6177440A
- Authority
- JP
- Japan
- Prior art keywords
- signer
- key
- document
- information
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/30—Compression, e.g. Merkle-Damgard construction
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
Abstract
Description
【発明の詳細な説明】
〔産業上の利用分野〕
本発明は、文書をディジタル情報とり、て送受信するシ
ステムにおいて1文書の作成責任者及び複数の査閲、承
認者を受信者及び第三者が検証できるように1文書に署
名を付加した通信する通信方式に関する。Detailed Description of the Invention [Industrial Field of Application] The present invention provides a system for transmitting and receiving documents as digital information, in which a person in charge of creating one document and multiple reviewers and approvers are connected to a recipient and a third party. The present invention relates to a communication method in which a signature is added to a document so that it can be verified.
従来の署・名文書通信方式としては、R8A法に代表さ
れる公開鍵暗号を用いた方式(R,L、R1ves’c
、 et、、 aL : ”A Mejh
od for (つbヒaininHD igi仁
al S igna仁ures and Pu
blic −Key CrypF+osysヒems
” Communications on A
CM 、 vol、、 2 。Conventional signature/signature document communication methods include methods using public key cryptography represented by the R8A method (R, L, R1ves'c
, et,, aL: ”A Mejh
od for
blic-Key CrypF+osys ems
”Communications on A
CM, vol., 2.
No2+pp、120−126.1978)が最も有望
な方式であるとされている。し7かし、この方式を用い
て、一つの文書にネV数の者が多重に署名を行うこと、
署名文番長が増加するという欠点がある。これに対し、
署名文書長の増加がほとんどない方式が提案されている
が、(板金、中村:多重署名に適した公開鍵暗号系、情
報処理学会論文誌。No. 2+pp, 120-126.1978) is said to be the most promising method. However, using this method, it is possible for a number of people to sign multiple signatures on one document.
This has the disadvantage that the signature number length increases. On the other hand,
A method has been proposed that causes almost no increase in the length of the signature document, but it is possible to do so without increasing the length of the signature document.
vol、24.Na4.pp474 480.1983
)。vol, 24. Na4. pp474 480.1983
).
この方式は1文書に冗長性が必要であること、シンタッ
クス検証が難しいこと、及び署名順序が事前に固定的に
定められていること等の欠点がある。This method has drawbacks such as the need for redundancy in one document, difficulty in syntax verification, and fixed signature order.
本発明の目的は、貼−の文書に対して複数の署名者の署
名を行う場合、単一の署名を行う場合とほぼ同等の署名
文番長となり、かつ、文書に冗長性が必要なく、シンタ
ックス検証が容易で署名順序が自由であるような署名文
書通信方式を提供することにある。An object of the present invention is to achieve a signature number length that is almost the same as when a single signature is applied when multiple signers sign a pasted document, and to eliminate the need for redundancy in the document. The purpose of the present invention is to provide a signed document communication system that allows easy tax verification and free signature order.
本発明は公開鍵暗号方式を利用するが、以下、実施例で
は、R3A暗号法(前出のRivest氏らの文献)を
用いた場合について示す。Although the present invention utilizes a public key cryptosystem, in the following embodiments, a case will be described in which R3A cryptography (the above-mentioned document by Rivest et al.) is used.
まず、各署名者t(i=1,2.・・・、T)は。First, each signer t (i=1, 2..., T) is.
R3A法の公開鍵(e、、n、)と秘密鍵d1を定め、
(el、n、)を公開鍵に登録する。ここで、In、l
をn、を2進数で表現した場合の桁数(ビット)と考え
る。Define the public key (e, , n,) and private key d1 of the R3A method,
Register (el, n,) as a public key. Here, In, l
Let n be the number of digits (bits) when expressed in binary.
次に、第1図、第2図に従って署名作成手順を説明する
。第1図は本発明において1番目の署名者の署名作成手
順を示す図、第2図はiff目の署名者の署名作成手順
を示す図である。Next, the signature creation procedure will be explained according to FIGS. 1 and 2. FIG. 1 is a diagram showing the signature creation procedure of the first signer in the present invention, and FIG. 2 is a diagram showing the signature creation procedure of the if-th signer.
まず1文書(M)1を作成した者は、第1図で示すよう
に、データ圧縮演算器2、R8A復号演算器3.復号鍵
d、、n、を用いて1次の関係を満足する情報S、、M
、を導き、2番目の署名者へ(M、、S、)を渡す。First, the person who created one document (M) 1, as shown in FIG. Information S, , M that satisfies the linear relationship using decryption keys d, , n
, and passes (M,,S,) to the second signer.
S 、 =m” (modn 、 )
(1)m=h (M)
(2)M、=M (3)
ここで、hはデータ圧縮関数であり、次のような実施例
がある。まず、デーイジタル情報Mを(In、 1−
1)ビット毎に分割し、M、、M、。S, = m” (modn, )
(1) m=h (M)
(2) M, = M (3)
Here, h is a data compression function, and the following examples are available. First, digital information M is (In, 1-
1) Divide into bits,M,,M,.
・・・+Mjとする。それらに対し1次の手順でm=h
(M)を得る。...+Mj. For them, m=h in the first-order procedure
Obtain (M).
C,、=O
CI= (MJ I’F;)C,+−+ ) ” (
modn + )(j=1.2.・・・、J)
m=Cエ (4)次に、
i番目の署名者は、第2図で示すように(aN n、I
>I n、−、lと(bNn、l≦In、−11の場合
に分けて、R5A復号演算器3、復号mdt 、n+
を用いて1次の関係を満足する情報S、、M、を導き、
(i+1)番目の署名者へ送る。ただし、i=Iの場合
は、S□1M工を署名検証者へ送る。C,,=O CI= (MJ I'F;)C,+-+ ) ” (
modn + ) (j=1.2..., J) m=Ce (4) Next,
The i-th signer is (aN n, I
R5A decoding calculator 3, decoding mdt, n+
derive information S,,M, that satisfies the first-order relationship using
Send to the (i+1)th signer. However, if i=I, S□1M is sent to the signature verifier.
(a)In、l>In、−,1の場合
S+ H(S+−+ )” (modrz )
(5)M、 =l14.−.
(6)(b)In、l≦In++lの場合
シ、゛
S、 = ([S+−+ コHer(−1)
(mad n + )(7)1帽1−1
M、 = [MJ−、、[S+−+ ]
コ (8)二二で[A]r3は、Aの
バイナリ表現の下位Bビットを意味する。つまり、+
[:A]B l=B。(a) When In, l>In, -, 1, S+ H(S+-+)" (modrz)
(5) M, =l14. −.
(6) (b) If In, l≦In++l, ゛S, = ([S+-+ Her(-1)
(mad n + ) (7) 1 cap 1-1 M, = [MJ-,, [S+-+]
(8) In 22, [A]r3 means the lower B bits of the binary representation of A. In other words, +
[:A]B l=B.
また+ [AlI3は、Aのバイナリ表現の上位(l
A I −B) ビットする。つまり、1 [Aコ
1=lAI−B、 l [A]、+l [Aコ
1=lAIまた、[A、C1は、A、Cのバイナリ表
現に対し、Aを上位にしCを下位にして結合したもので
ある6
次に第3図、第4図に従って署名検証手順を説明する。Moreover, + [AlI3 is the upper binary representation of A (l
A I - B) Bit. In other words, 1 [A
1=lAI-B, l [A], +l [A co
1=lAIAlso, [A and C1 are the binary representations of A and C combined with A at the top and C at the bottom.6 Next, the signature verification procedure will be explained according to Figures 3 and 4. do.
第3図は署名検証事前処理を示す図であり、第4図は署
名検証処理を示す図である。FIG. 3 is a diagram showing signature verification pre-processing, and FIG. 4 is a diagram showing signature verification processing.
まず、第3図に示すように、i=I、I−1゜・・・、
2に対し、R8A暗号演算器4.暗号鍵8+In、を用
いて1次の検証事前処理を行う。e++0、は公開鍵よ
り得る。First, as shown in Fig. 3, i=I, I-1°...,
2, R8A cryptographic calculator 4. The first verification preprocessing is performed using the encryption key 8+In. e++0 is obtained from the public key.
(a)l n(−、l <I n+ 1の場合S=、
= [S、 (modmn、)] (9)1札
i−+1
M、 −、=M 、 Iへ□−+ 1−1x+ 1 □
’ (10)ここで、S□=S□1ML
=M工
(bNn+−11≧1n、1の場合
M、−,= 口X「。 コ1Ki−11−1’K11
l (12)次に、第4図に示すように、
検証事前処理で求めた(M、、S、)に対し、データ圧
縮演算器2゜R3A暗号器、暗号@ e + + n
I−比較器5を用いて1次の関係が成立するかどうかを
検証し、成立すれば、署名文書(M、、S工)は、1人
の署名者i (i=1.・・・、I)により正しく署
名されたものとみなす。(a) l n(-, S= if l < I n+ 1,
= [S, (modmn,)] (9) 1 note i-+1 M, -, =M, to I □-+ 1-1x+ 1 □
' (10) Here, S□=S□1ML
= M engineering (bNn+-11≧1n, if 1, M, -, = mouth
l (12) Next, as shown in Figure 4,
For (M,,S,) obtained in the verification preprocessing, data compression calculator 2゜R3A encoder, cipher @ e + + n
The I-comparator 5 is used to verify whether a linear relationship holds true, and if it holds true, the signed document (M, S) is signed by one signer i (i=1... , I).
−艦、′
S、 =h (M、 ) (modn、 )
(13)以上の実施例において、n+ (i=1.
2.・・・。−Ship, ′S, =h (M, ) (modn, )
(13) In the above embodiments, n+ (i=1.
2. ....
■)の大きさは、安全性等の観点より660ビット程度
にすることが前出のRivestらの論文により准めら
れている6ところで、署名文書(M 。The size of the signature document (M.
S )の大きさをできるだけ小さくするためには5n1
をできるだけ同じ大きさにすることが望まれる5そこ
で、Int +”660とする。(i=1゜2、・・
■)。n、をこのように定めてもn、が十分多く存在す
る。二とが前出の抜食らの論文に示されているため、安
全上問題はない。In order to make the size of S) as small as possible, 5n1
It is desirable to make them the same size as possible5. Therefore, Int + "660. (i = 1゜2, . . .
■). Even if n is defined in this way, there will still be a sufficiently large number of n. There is no safety problem because the second and second methods are shown in the paper by Nushoku et al. mentioned above.
このとき1次の関係が成立する。At this time, a linear relationship is established.
+ [M工、S、]≦1Ml+660+Iつまり、1
人の署名を行っても、1人の署名に比べてIバット上増
えることない5
〔発明の効果〕
以上説明したように、本発明によれば、甲、−の文書に
対し複数の署名者の署名を行う場合、Qt−の署名を行
う場合とほぼ同等である。また、署名検証においてシン
タックス検証が可能であり9文書に冗長性を必要し7な
い。さらに、署名順序が事。+ [M, S,]≦1Ml+660+I, that is, 1
Even if a person signs a document, the number of signers will not increase compared to a single person's signature.5 [Effect of the Invention] As explained above, according to the present invention, multiple signers can sign a document from A and -. When performing the signature of Qt-, it is almost equivalent to the case of performing the signature of Qt-. Furthermore, syntax verification is possible in signature verification, and there is no need for redundancy in documents. Additionally, the signing order matters.
前に生成、登録した情報(nl 、 e、、d+ )に
依存しない。従って1本発明は、オフ、イス等において
1文書転送、蓄積が電子化され、一つの文書に対して承
認署名、査閲署名等が必要となる場合に有効である。It does not depend on previously generated and registered information (nl, e, d+). Therefore, the present invention is effective when one document is transferred and stored electronically while off-duty, at a chair, etc., and an approval signature, review signature, etc. are required for one document.
第1図は本発明において1番目の署名者の署名作成手順
を示す図、第2図はi呑口の署名者の署名作成手順を示
す図、第3図は署名検証事前処理を示す図、第4図は署
名検証処理を示す図である。
■・・・文書M、 2・・・データ圧縮演算器。
3・・・R3A復号器、 4・・・R8A暗号器、5・
・・比較器。FIG. 1 is a diagram showing the signature creation procedure of the first signer in the present invention, FIG. 2 is a diagram showing the signature creation procedure of the i-mouth signer, FIG. FIG. 4 is a diagram showing signature verification processing. ■...Document M, 2...Data compression calculator. 3...R3A decoder, 4...R8A encoder, 5...
...Comparator.
Claims (1)
書に対し複数の者が署名を行うシステムにおいて、シス
テムで定められた秘密鍵と公開鍵を各署名者が予めそれ
ぞれ作成して、そのうちの公開鍵を公開鍵に登録してお
き、文書作成者は文書を予め定めた関数により変換し、
それを秘密鍵を用いて復号した情報を文書に付加して次
の署名者へ送り、次の署名者は文書に付加された署名情
報の全体もしくはその一部を秘密鍵を用いて復号し、復
号した情報を復号する前の情報に置き換えたものを署名
文書として次の署名者へ送り、以後上記処理を最終署名
者まで繰り返し、最終的に作成された署名文書を検証す
る側は、まず文書に付加された署名情報の全体もしくは
一部を最後の署名者の公開鍵で暗号化し、その情報を暗
号化する前の情報に置き換えた署名文書の署名情報の全
体もしくは一部をさらに次の署名者の公開鍵で暗号化し
、同様の処理を繰り返し、最後に2番目の署名者の公開
鍵で暗号化した情報で置き換えた署名文書の署名情報の
全体もしくは一部を最初の署名者の公開鍵で暗号化した
情報が文書を前記関数で変換した情報と一致するかどう
か検証することを特徴とする署名文書通信方式。(1) In a system in which documents are sent and received as digital information and multiple people sign one document, each signer creates a private key and a public key determined by the system in advance, and one of them is made public. The key is registered as a public key, and the document creator converts the document using a predetermined function.
The information decrypted using the private key is added to the document and sent to the next signer, and the next signer decrypts all or part of the signature information added to the document using the private key, The decrypted information is replaced with the information before decryption and sent to the next signer as a signed document, and the above process is then repeated up to the final signer. Encrypt all or part of the signature information added to the last signer using the public key of the last signer, and replace the information with the information before encrypting.The whole or part of the signature information of the signed document is then added to the next signature. The same process is repeated, and finally all or part of the signature information of the signed document is replaced with information encrypted with the public key of the second signer, using the public key of the first signer. A signed document communication method characterized by verifying whether the information encrypted by the function matches the information obtained by converting the document by the function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP59199179A JPH0620199B2 (en) | 1984-09-22 | 1984-09-22 | Signature document communication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP59199179A JPH0620199B2 (en) | 1984-09-22 | 1984-09-22 | Signature document communication method |
Publications (2)
Publication Number | Publication Date |
---|---|
JPS6177440A true JPS6177440A (en) | 1986-04-21 |
JPH0620199B2 JPH0620199B2 (en) | 1994-03-16 |
Family
ID=16403459
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP59199179A Expired - Lifetime JPH0620199B2 (en) | 1984-09-22 | 1984-09-22 | Signature document communication method |
Country Status (1)
Country | Link |
---|---|
JP (1) | JPH0620199B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006057171A1 (en) * | 2004-11-29 | 2006-06-01 | Nec Corporation | Signature and verifying method, and signature and verifying device |
US8095792B2 (en) | 2004-02-13 | 2012-01-10 | Certicom Corp. | One way authentication |
-
1984
- 1984-09-22 JP JP59199179A patent/JPH0620199B2/en not_active Expired - Lifetime
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8095792B2 (en) | 2004-02-13 | 2012-01-10 | Certicom Corp. | One way authentication |
US8359469B2 (en) | 2004-02-13 | 2013-01-22 | Certicom Corp. | One way authentication |
US8938617B2 (en) | 2004-02-13 | 2015-01-20 | Certicom Corp. | One way authentication |
WO2006057171A1 (en) * | 2004-11-29 | 2006-06-01 | Nec Corporation | Signature and verifying method, and signature and verifying device |
JP4848957B2 (en) * | 2004-11-29 | 2011-12-28 | 日本電気株式会社 | Signature and verification method and signature and verification apparatus |
Also Published As
Publication number | Publication date |
---|---|
JPH0620199B2 (en) | 1994-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10122710B2 (en) | Binding a data transaction to a person's identity using biometrics | |
JP2762909B2 (en) | Electronic signature device | |
CN109743171B (en) | Key series method for solving multi-party digital signature, timestamp and encryption | |
JP2776491B2 (en) | Tag determination method and device | |
US7730319B2 (en) | Provisional signature schemes | |
CN108667626A (en) | The two sides cooperation SM2 endorsement methods of safety | |
US9166957B2 (en) | Digital file authentication using biometrics | |
CN110933045A (en) | Block chain digital asset privacy protection method based on commitment | |
CN101136046B (en) | Electric signing verification system and method thereof | |
US20050081039A1 (en) | Method for creating and verifying simple object access protocol message in web service security using signature encryption | |
US9438589B2 (en) | Binding a digital file to a person's identity using biometrics | |
CN110380846A (en) | A kind of electronic health record patient endorsement method and system | |
CN112035894A (en) | Electronic evidence trusteeship system | |
CN110417555A (en) | A kind of safe encryption method and system of personal electric signature | |
CN114448641A (en) | Privacy encryption method, electronic equipment, storage medium and chip | |
WO2000013368A1 (en) | Method of authenticating or 'digitally signing' digital data objects | |
US20050240762A1 (en) | Cryptographic method and apparatus | |
CN113837756A (en) | Electronic invoice verification method and system | |
JP2000250408A (en) | File authentication system, system and method for signature, system and method for authentication, and recording medium | |
CN116346336B (en) | Key distribution method based on multi-layer key generation center and related system | |
US6931126B1 (en) | Non malleable encryption method and apparatus using key-encryption keys and digital signature | |
Chauhan et al. | Digital signature with message security process | |
JPS6177440A (en) | Signature document communication system | |
TWI704794B (en) | System and implement method for signing and verifying contract in a block chain network | |
CN1567288A (en) | Method for multiple encryption of file and simultaneous sealing/unsealing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EXPY | Cancellation because of completion of term |