KR20090089948A - 겹선형 사상을 이용한 전자서명 방법 - Google Patents
겹선형 사상을 이용한 전자서명 방법 Download PDFInfo
- Publication number
- KR20090089948A KR20090089948A KR1020080015128A KR20080015128A KR20090089948A KR 20090089948 A KR20090089948 A KR 20090089948A KR 1020080015128 A KR1020080015128 A KR 1020080015128A KR 20080015128 A KR20080015128 A KR 20080015128A KR 20090089948 A KR20090089948 A KR 20090089948A
- Authority
- KR
- South Korea
- Prior art keywords
- mapping
- digital signature
- electronic signature
- generating
- addition group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000013507 mapping Methods 0.000 title claims abstract description 39
- 238000000034 method Methods 0.000 claims abstract description 40
- 238000004364 calculation method Methods 0.000 abstract description 6
- 238000010200 validation analysis Methods 0.000 abstract description 2
- 238000012795 verification Methods 0.000 description 6
- 230000004075 alteration Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 101150025733 pub2 gene Proteins 0.000 description 1
- 238000013518 transcription Methods 0.000 description 1
- 230000035897 transcription Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Physics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Physics & Mathematics (AREA)
- Algebra (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (5)
- 겹선형 사상(Bilinear Mapping)을 이용한 전자서명 방법으로서,(1) 서명자(signer)에 대한 비밀키 x를 생성하는 단계;(2) 상기 단계 (1)에서 생성된 상기 비밀키 x 및 겹선형 사상에 대한 덧셈군 생성자 P를 이용하여, 상기 서명자에 대한 공개키 Ppub를 (1/x)P로서 생성하는 단계; 및(3) 상기 비밀키 x를 이용하여 메시지 m에 대한 전자서명 σ을 생성하는 단계를 포함하는 전자서명 방법.
- 제1항에 있어서,상기 단계 (3)에서, 다음 수학식에 의하여 상기 전자서명 σ을 생성하는 것을 특징으로 하는 전자서명 방법.σ = xH(m)여기서, 함수 H()는 full-domain 해시 함수로서 임의의 비트 스트링을 입력받아 겹선형 사상의 덧셈군 G1의 한 원소로 변환하는 함수이며, 암호학적 해시 함수의 성질을 만족한다.
- 제1항에 있어서,(4) 상기 공개키(Ppub)를 이용하여, 전자서명의 유효성을 검증하는 단계를 더 포함하는 전자서명 방법.
- 제3항에 있어서,상기 단계 (4)에서, 다음 수학식을 이용하여 전자서명의 유효성을 검증하는 것을 특징으로 하는 전자서명 방법.e(Ppub, σ) = e(P, H(m))여기서, 함수 e()는 겹선형 사상의 덧셈군 G1의 두 원소를 입력받아 겹선형 사상의 곱셈군 G2로 사상시키는 겹선형 사상을 나타내며, 함수 H()는 full-domain 해시 함수로서 임의의 비트 스트링을 입력받아 겹선형 사상의 덧셈군 G1의 한 원소로 변환하는 함수이며, 암호학적 해시 함수의 성질을 만족한다.
- 제1항에 있어서,(5) 시스템 파라미터로서, 덧셈군 생성자(P), 덧셈군(G1), 곱셈군(G2), 해시 함수(H)를 생성하여 모든 사용자에게 공개하는 단계를 더 포함하는 전자서명 방법.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020080015128A KR101020300B1 (ko) | 2008-02-20 | 2008-02-20 | 겹선형 사상을 이용한 전자서명 방법 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020080015128A KR101020300B1 (ko) | 2008-02-20 | 2008-02-20 | 겹선형 사상을 이용한 전자서명 방법 |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20090089948A true KR20090089948A (ko) | 2009-08-25 |
KR101020300B1 KR101020300B1 (ko) | 2011-03-07 |
Family
ID=41207918
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020080015128A Expired - Fee Related KR101020300B1 (ko) | 2008-02-20 | 2008-02-20 | 겹선형 사상을 이용한 전자서명 방법 |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101020300B1 (ko) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101136119B1 (ko) * | 2010-11-23 | 2012-04-17 | 순천향대학교 산학협력단 | Abm 기반 그룹키 관리 방법 |
KR101423955B1 (ko) * | 2013-06-28 | 2014-08-01 | 고려대학교 산학협력단 | 사용자단말의 콘텐츠 접근 제어에 따른 콘텐츠 분배 방법 및 시스템 |
US9258130B2 (en) | 2012-12-14 | 2016-02-09 | Electronics And Telecommunications Research Institute | Apparatus and method for anonymity-based authentication and key agreement capable of providing communication message binding property |
CN112100674A (zh) * | 2020-10-28 | 2020-12-18 | 上海第二工业大学 | 一种应用于医疗信息系统的隐私信息传输方法 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100581440B1 (ko) | 2003-07-04 | 2006-05-23 | 학교법인 한국정보통신학원 | 겹선형쌍을 이용한 개인식별정보 기반의 대리서명 장치 및방법 |
KR100732233B1 (ko) * | 2004-12-14 | 2007-06-27 | 한국전자통신연구원 | 겹선형 함수를 이용한 대리서명능력 제한성을 가지는개인식별정보 기반 대리서명 장치 및 그 방법 |
KR20070067324A (ko) * | 2005-12-23 | 2007-06-28 | 학교법인 대전기독학원 한남대학교 | 겹선형 사상을 이용한 한정적 검증자 서명 방법 |
-
2008
- 2008-02-20 KR KR1020080015128A patent/KR101020300B1/ko not_active Expired - Fee Related
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101136119B1 (ko) * | 2010-11-23 | 2012-04-17 | 순천향대학교 산학협력단 | Abm 기반 그룹키 관리 방법 |
US9258130B2 (en) | 2012-12-14 | 2016-02-09 | Electronics And Telecommunications Research Institute | Apparatus and method for anonymity-based authentication and key agreement capable of providing communication message binding property |
KR101423955B1 (ko) * | 2013-06-28 | 2014-08-01 | 고려대학교 산학협력단 | 사용자단말의 콘텐츠 접근 제어에 따른 콘텐츠 분배 방법 및 시스템 |
CN112100674A (zh) * | 2020-10-28 | 2020-12-18 | 上海第二工业大学 | 一种应用于医疗信息系统的隐私信息传输方法 |
CN112100674B (zh) * | 2020-10-28 | 2024-04-16 | 上海第二工业大学 | 一种应用于医疗信息系统的隐私信息传输方法 |
Also Published As
Publication number | Publication date |
---|---|
KR101020300B1 (ko) | 2011-03-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Das et al. | A novel remote user authentication scheme using bilinear pairings | |
Herranz | Deterministic identity-based signatures for partial aggregation | |
JP3522447B2 (ja) | 認証交換方法および付加型公衆電子署名方法 | |
US7653817B2 (en) | Signature schemes using bilinear mappings | |
US7869593B2 (en) | Software for providing based on shared knowledge public keys having same private key | |
Singh et al. | ID-based proxy signature scheme with message recovery | |
Liu et al. | Server-aided anonymous attribute-based authentication in cloud computing | |
Shankar et al. | Improved multisignature scheme for authenticity of digital document in digital forensics using edward‐curve digital signature algorithm | |
KR20030008183A (ko) | 겹선형쌍을 이용한 개인식별정보 기반의 원형서명 방법 | |
CN104184588A (zh) | 基于身份的不可拆分数字签名方法 | |
KR20030062401A (ko) | 겹선형쌍을 이용한 개인식별정보 기반의 은닉서명 장치 및방법 | |
CN106027262A (zh) | 一种抵抗密钥恢复攻击的多变量签名方法 | |
CN101441693B (zh) | 基于椭圆曲线对电子文档数字签名的安全保护方法 | |
KR101020300B1 (ko) | 겹선형 사상을 이용한 전자서명 방법 | |
CN110519040B (zh) | 基于身份的抗量子计算数字签名方法和系统 | |
Tso | A new way to generate a ring: Universal ring signature | |
CN104780047A (zh) | 前向安全的无证书可验证加密签名方法 | |
US7693277B2 (en) | Generating digital signatures using ephemeral cryptographic key | |
US20060153369A1 (en) | Providing cryptographic key based on user input data | |
Li et al. | A forward-secure certificate-based signature scheme | |
Ebrahimi et al. | Enhancing cold wallet security with native multi-signature schemes in centralized exchanges | |
Ch et al. | Identity-based cryptosystem based on tate pairing | |
CN115277019A (zh) | 一种敏捷的数字签名验签方法及系统 | |
Ullah et al. | An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing | |
Iwasokun et al. | An RSA algorithm for securing financial data on the cloud |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
PA0109 | Patent application |
Patent event code: PA01091R01D Comment text: Patent Application Patent event date: 20080220 |
|
PA0201 | Request for examination | ||
A107 | Divisional application of patent | ||
PA0107 | Divisional application |
Comment text: Divisional Application of Patent Patent event date: 20081112 Patent event code: PA01071R01D |
|
PG1501 | Laying open of application | ||
E902 | Notification of reason for refusal | ||
PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20100216 Patent event code: PE09021S01D |
|
E90F | Notification of reason for final refusal | ||
PE0902 | Notice of grounds for rejection |
Comment text: Final Notice of Reason for Refusal Patent event date: 20100909 Patent event code: PE09021S02D |
|
E701 | Decision to grant or registration of patent right | ||
PE0701 | Decision of registration |
Patent event code: PE07011S01D Comment text: Decision to Grant Registration Patent event date: 20110225 |
|
GRNT | Written decision to grant | ||
PR0701 | Registration of establishment |
Comment text: Registration of Establishment Patent event date: 20110228 Patent event code: PR07011E01D |
|
PR1002 | Payment of registration fee |
Payment date: 20110302 End annual number: 3 Start annual number: 1 |
|
PG1601 | Publication of registration | ||
FPAY | Annual fee payment |
Payment date: 20131217 Year of fee payment: 4 |
|
PR1001 | Payment of annual fee |
Payment date: 20131217 Start annual number: 4 End annual number: 4 |
|
FPAY | Annual fee payment |
Payment date: 20141204 Year of fee payment: 5 |
|
PR1001 | Payment of annual fee |
Payment date: 20141204 Start annual number: 5 End annual number: 5 |
|
FPAY | Annual fee payment |
Payment date: 20160113 Year of fee payment: 6 |
|
PR1001 | Payment of annual fee |
Payment date: 20160113 Start annual number: 6 End annual number: 6 |
|
FPAY | Annual fee payment |
Payment date: 20161220 Year of fee payment: 7 |
|
PR1001 | Payment of annual fee |
Payment date: 20161220 Start annual number: 7 End annual number: 7 |
|
LAPS | Lapse due to unpaid annual fee | ||
PC1903 | Unpaid annual fee |
Termination category: Default of registration fee Termination date: 20181211 |