[go: up one dir, main page]

CN110086628B - A method for elliptic curve signature in single-source network coding environment - Google Patents

A method for elliptic curve signature in single-source network coding environment Download PDF

Info

Publication number
CN110086628B
CN110086628B CN201910326163.1A CN201910326163A CN110086628B CN 110086628 B CN110086628 B CN 110086628B CN 201910326163 A CN201910326163 A CN 201910326163A CN 110086628 B CN110086628 B CN 110086628B
Authority
CN
China
Prior art keywords
elliptic curve
signature
network coding
source network
trusted party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910326163.1A
Other languages
Chinese (zh)
Other versions
CN110086628A (en
Inventor
俞惠芳
李雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Posts and Telecommunications
Original Assignee
Xian University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Posts and Telecommunications filed Critical Xian University of Posts and Telecommunications
Priority to CN201910326163.1A priority Critical patent/CN110086628B/en
Publication of CN110086628A publication Critical patent/CN110086628A/en
Application granted granted Critical
Publication of CN110086628B publication Critical patent/CN110086628B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A method for elliptic curve signature under single-source network coding environment comprises the steps of system initialization, generation of a single-source network coding key pair, determination of a hash value of a message, elliptic curve signature of a source node, message combination, elliptic curve signature of an intermediate node and signature verification. The invention adopts elliptic curve signature and homomorphic hash function, simplifies the verification process of the intermediate node, reduces the calculation complexity, reduces the energy consumption, resists the pollution in generations, and simultaneously introduces the generation identifier to effectively resist the pollution between generations. The invention has the advantages of strong safety, high calculation efficiency and the like, and can be popularized and applied in single-source network coding.

Description

Elliptic curve signature method under single-source network coding environment
Technical Field
The invention belongs to the technical field of network information security, and particularly relates to an elliptic curve signature method and a homomorphic hash function in single-source network coding and cryptography.
Background
In a conventional communication network, intermediate nodes of the network can only forward incoming data packets without any processing of the data content. By adopting the network coding, not only can the network resources be greatly saved, but also the network transmission rate, the throughput and the reliability can be improved, and the energy consumption can be reduced. The method has great advantages in improving the comprehensive performance of the network, but brings a plurality of pollution threats. The system is polluted by the pollution of nodes or unstable network communication transmission and the like. The pollution information is combined with other effective messages through coding transmission, so that pollution is transmitted to other messages, and finally, a communication system is crashed to prevent a sink node from recovering original information. These insecurity factors greatly limit the application range of network coding, and prevent the application of the network coding in real life.
The traditional elliptic curve digital signature method can not resist the pollution in generations and the pollution between generations, the problem that the elliptic curve signature method in the single-source network coding environment is not adopted to resist the pollution in generations and the pollution between generations at present, and how to construct the elliptic curve homomorphic signature in the single-source network coding environment is a technical problem which needs to be urgently solved in the cryptology at present.
Disclosure of Invention
The technical problem to be solved by the present invention is to overcome the above drawbacks of the prior art, and to provide a method for elliptic curve signature in a single-source network coding environment, which has strong security and high computational efficiency, and can resist intra-generation pollution and inter-generation pollution.
The technical scheme adopted for solving the technical problems comprises the following steps:
A. system initialization
(A1) Trusted party defines a finite field FqUpper elliptic curve E:
y2≡x3+ax+b
wherein a, b ∈ FqQ is a large prime number in a finite positive integer satisfying 4a3+27b2Constant not equal to 0.
(A2) The trusted party sends an identifier I of the generation in the appointed single-source network code to the source node of the single-source network code through a secret channel:
I={I1,I2,…,In}
where n is a finite positive integer.
(A3) Selection of cryptographically secure Hash function H by trusted partyG
{0,1}*→G1
Wherein G is1Is a group of addition cycles of order large prime d.
(A4) The trusted party selects a, a e (1,2, t), determining a private key S of a generation in the single-source network codingSKPrivate key K of elliptic curve signature, public key P of elliptic curve signature:
SSK=α·HG(I)
K=η·SSK
P=K·G
wherein eta is an secret random number selected by a trusted authority, G is a base point on an elliptic curve E, and HG(I) Is a hash value of the generation identity.
(A5) The trusted party selects a cryptographically secure Hash function h as:
{0,1}*→Zq
wherein Zq∈{1,2,...,q}。
(A6) The trusted party discloses a system parameter z:
z=(E,Fq,G,q,t,h,P,HG)
where t is the order of the trustable chosen base point G and is a prime number in the finite positive integer.
B. Generating a private key K for a single-source network code0And a public key P0
(B1) Determining a private key K of a source node of a single source network coding0And a public key P0
K0=η0·SSK
P0=K0·G
Wherein eta0E {1, 2.. eta., t } is a secret random number chosen by the trusted party, t being a finite positive integer.
(B2) Determining a private key K of an intermediate node of a single-source network codeidAnd a public key Pid
Kid=ηid·SSK
Pid=Kid·G
Wherein etaidIs 1, 2.. t, a secret random number chosen for the trusted party, id is 1, 2.. e, e is the number of intermediate nodes.
C. Determining hash value of message
Cancellation generated by source nodeThe message M is divided into M modules M1,M2,...,MmEach module is an n-dimensional vector, represented as:
Figure BDA0002036234870000031
expanding all modules into a vector V with m + n dimensionsi
Vi=(vi,1,vi,2,...,vi,m+n)
Where i ∈ {1,2, …, m }, a message vector V is determinediHash function value of (1):
Figure BDA0002036234870000032
wherein R isjA set of base point sets on the elliptic curve is randomly selected for the source node and the order is t.
D. Elliptic curve signature on source node of single-source network coding
(D1) Credible side randomly selects K'0E {1,2, …, t }, determining X0
X0=h(Vi,K′0)·G
In the formula X0Is a point (x) on the elliptic curve0,y0)。
(D2) Determining r of a source node0,S0
r0=x0modt
S0=(h(Vi,K′0)+r0-h(Vi)K0)modt
(D3) Determining a signature σ of a source node0
σ0=(r0,S0,HG(I))
(D4) Vector V of messagesiHash value h (V) of messagei) Message signature σ0And sending the data to an intermediate node or a sink node of the single-source network coding.
E. Message assembly
(E1) The intermediate node of the single source network coding combines the messages into:
Figure BDA0002036234870000041
where a is the global coding vector of the message, a ═ a1,a2,...,am) And i is a finite positive integer.
(E2) Determining a hash function value h (w) for the combined message w:
Figure BDA0002036234870000042
where m is a finite positive integer.
F. Elliptic curve signature on intermediate node of single-source network coding
(F1) Credible side randomly selects K'idE {1,2, …, t }, determining Xid
Xid=h(w,K′id)·G
In the formula XidIs a point (x) on the elliptic curveid,yid)。
(F2) Determining an intermediate node rid,Sid
rid=xidmodt
Sid=(h(w,K′id)+rid-h(w)Kid)modt
(F3) Signature σ of intermediate nodeid
σid=(rid,Sid,H′G(I))
G. Signature verification by the receiver
(G1) Recipient verification HG(I)=H′G(I) And if the judgment result is true, the signature is accepted, and if the judgment result is true, the signature is rejected.
(G2) Determining U of receiver1,U2
U1=(Sid-rid)modt
U2=h(w)modt
(G3) The recipient determines X:
X=U1G+U2Pid
x is a point (X ') on the elliptic curve'id,y′id)。
(G4) The recipient determines V':
V′=x′idmodt
(G5) receiver authentication V ═ ridIf the elliptic curve signature is established, the elliptic curve signature is successful; otherwise the elliptic curve signature fails.
The invention adopts elliptic curve signature and homomorphic hash function, simplifies the verification process of the intermediate node, reduces the calculation complexity, reduces the energy consumption, can resist the pollution in generations and can effectively resist the pollution between generations. The invention has the advantages of strong safety, high calculation efficiency and the like, and can be popularized and applied in single-source network coding.
Drawings
FIG. 1 is a flowchart of example 1 of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the following drawings and examples, but the present invention is not limited to these examples.
Example 1
This embodiment uses an elliptic curve y2≡x3+ ax + b mod q, large prime q 1229388206666334394638158784063623508484129267643 as an example, the method for homomorphic signature of elliptic curve of single-source network coding consists of the following steps (as shown in fig. 1):
A. system initialization
(A1) Trusted party defines a finite field FqUpper elliptic curve E:
y2≡x3+ax+b
wherein a, b ∈ FqQ is a large prime number in finite positive integers, q is 1229388206666334394638158784063623508484129267643, and satisfies 4a3+27b2Constant not equal to 0.
(A2) The trusted party sends an identifier I of the generation in the appointed single-source network code to the source node of the single-source network code through a secret channel:
I={I1,I2,…,In}
where n is a finite positive integer.
(A3) Selection of cryptographically secure Hash function H by trusted partyG
{0,1}*→G1
Wherein G is1Is a group of addition cycles of order large prime d.
(A4) The credible party selects alpha, alpha E (1, 2.. eta., t) and determines the private key S of the generation in the single-source network codingSKPrivate key K of elliptic curve signature, public key P of elliptic curve signature:
SSK=α·HG(I)
K=η·SSK
P=K·G
wherein eta is an secret random number selected by a trusted authority, G is a base point on an elliptic curve E, and HG(I) Is a hash value of the generation identity.
(A5) The trusted party selects a cryptographically secure Hash function h as:
{0,1}*→Zq
wherein Zq∈{1,2,...,1229388206666334394638158784063623508484129267643}。
(A6) The trusted party discloses a system parameter z:
z=(E,Fq,G,q,t,h,P,HG)
where t is the order of the trustable chosen base point G and is a prime number in the finite positive integer.
B. Generating a private key K for a single-source network code0And a public key P0
(B1) Determining a private key K of a source node of a single source network coding0And a public key P0
K0=η0·SSK
P0=K0·G
Wherein eta0E {1, 2.. eta., t } is a secret random number chosen by the trusted party, t being a finite positive integer.
(B2) Determining a private key K of an intermediate node of a single-source network codeidAnd a public key Pid
Kid=ηid·SSK
Pid=Kid·G
Wherein etaidIs 1, 2.. t, a secret random number chosen for the trusted party, id is 1, 2.. e, e is the number of intermediate nodes.
C. Determining hash value of message
The message M generated by the source node is divided into M modules M1,M2,...,MmEach module is an n-dimensional vector, represented as:
Figure BDA0002036234870000071
expanding all modules into a vector V with m + n dimensionsi
Vi=(vi,1,vi,2,...,vi,m+n)
Where i ∈ {1,2, …, m }, a message vector V is determinediHash function value of (1):
Figure BDA0002036234870000072
wherein R isjA set of base point sets on the elliptic curve is randomly selected for the source node and the order is t.
D. Elliptic curve signature on source node of single-source network coding
(D1) Credible side randomly selects K'0E {1,2, …, t }, determining X0
X0=h(Vi,K′0)·G
In the formula X0Is a point (x) on the elliptic curve0,y0)。
(D2) Determining r of a source node0,S0:
r0=x0modt
S0=(h(Vi,K′0)+r0-h(Vi)K0)modt
(D3) Determining a signature σ of a source node0
σ0=(r0,S0,HG(I))
(D4) Vector V of messagesiHash value h (V) of messagei) Message signature σ0And sending the data to an intermediate node or a sink node of the single-source network coding.
E. Message assembly
(E1) The intermediate node of the single source network coding combines the messages into:
Figure BDA0002036234870000081
where a is the global coding vector of the message, a ═ a1,a2,...,am) And i is a finite positive integer.
(E2) Determining a hash function value h (w) for the combined message w:
Figure BDA0002036234870000082
where m is a finite positive integer.
F. Elliptic curve signature on intermediate node of single-source network coding
(F1) Credible side randomly selects K'idE {1,2, …, t }, determining Xid
Xid=h(w,K′id)·G
In the formula XidIs a point (x) on the elliptic curveid,yid)。
(F2) Determining an intermediate node rid,Sid
rid=xidmodt
Sid=(h(w,K′id)+rid-h(w)Kid)modt
(F3) Signature σ of intermediate nodeid
σid=(rid,Sid,H′G(I))
G. Signature verification by the receiver
(G1) Recipient verification HG(I)=H′G(I) And if the judgment result is true, the signature is accepted, and if the judgment result is true, the signature is rejected.
(G2) Determining U of receiver1,U2
U1=(Sid-rid)modt
U2=h(w)modt
(G3) The recipient determines X:
X=U1G+U2Pid
x is a point (X ') on the elliptic curve'id,y′id)。
(G4) The recipient determines V':
V′=x′idmodt
(G5) receiver authentication V ═ ridIf the elliptic curve signature is established, the elliptic curve signature is successful; otherwise the elliptic curve signature fails.
Example 2
This embodiment uses an elliptic curve y2≡x3+ ax + b mod q, large prime q 1449849246051449679173689466738734355356891578223 as an example, the method for homomorphic signature of elliptic curve of single-source network coding comprises the following steps:
A. system initialization
(A1) Trusted party defines a finite field FqUpper elliptic curve E:
y2≡x3+ax+b
wherein a, b ∈ FqQ is a large prime number in finite positive integers, q is 1449849246051449679173689466738734355356891578223, and satisfies 4a3+27b2Constant not equal to 0.
(A2) The trusted party sends an identifier I of the generation in the appointed single-source network code to the source node of the single-source network code through a secret channel:
I={I1,I2,…,In}
where n is a finite positive integer.
(A3) Selection of cryptographically secure Hash function H by trusted partyG
{0,1}*→G1
Wherein G is1Is a group of addition cycles of order large prime d.
(A4) The credible party selects alpha, alpha E (1, 2.. eta., t) and determines the private key S of the generation in the single-source network codingSKPrivate key K of elliptic curve signature, public key P of elliptic curve signature:
SSK=α·HG(I)
K=η·SSK
P=K·G
wherein eta is an secret random number selected by a trusted authority, G is a base point on an elliptic curve E, and HG(I) Is a hash value of the generation identity.
(A5) The trusted party selects a cryptographically secure Hash function h as:
{0,1}*→Zq
wherein Zq∈{1,2,...,1449849246051449679173689466738734355356891578223}。
(A6) The trusted party discloses a system parameter z:
z=(E,Fq,G,q,t,h,P,HG)
the other steps were the same as in example 1.
Example 3
This embodiment uses an elliptic curve y2≡x3The + ax + bmdq and the large prime number q of 1366294046726635493399336680549214898319268492501 are taken as examples, and the method for homomorphic signature of the elliptic curve of the single-source network coding comprises the following steps:
A. system initialization
(A1) Trusted party defines a finite field FqUpper elliptic curve E:
y2≡x3+ax+b
wherein a, b ∈ FqQ is a large prime number in finite positive integers, q is 1366294046726635493399336680549214898319268492501, and satisfies 4a3+27b2Constant not equal to 0.
(A2) The trusted party sends an identifier I of the generation in the appointed single-source network code to the source node of the single-source network code through a secret channel:
I={I1,I2,…,In}
where n is a finite positive integer.
(A3) Selection of cryptographically secure Hash function H by trusted partyG
{0,1}*→G1
Wherein G is1Is a group of addition cycles of order large prime d.
(A4) The credible party selects alpha, alpha E (1, 2.. eta., t) and determines the private key S of the generation in the single-source network codingSKPrivate key K of elliptic curve signature, public key P of elliptic curve signature:
SSK=α·HG(I)
K=η·SSK
P=K·G
wherein eta is an secret random number selected by a trusted authority, G is a base point on an elliptic curve E, and HG(I) Is a hash value of the generation identity.
(A5) The trusted party selects a cryptographically secure Hash function h as:
{0,1}*→Zq
wherein Zq∈{1,2,...,1366294046726635493399336680549214898319268492501}。
(A6) The trusted party discloses a system parameter z:
z=(E,Fq,G,q,t,h,P,HG)
the other steps were the same as in example 1.

Claims (1)

1.一种单源网络编码环境下椭圆曲线签名的方法,其特征在于它是由下述步骤组成:1. the method for elliptic curve signature under a single source network coding environment is characterized in that it is made up of the following steps: A、系统初始化A. System initialization (A1)可信方定义有限域Fq上的椭圆曲线E:(A1) The trusted party defines the elliptic curve E on the finite field F q : y2≡x3+ax+by 2 ≡x 3 +ax+b 其中a,b∈Fq,q是有限正整数中的一个大素数,满足4a3+27b2≠0的常量;where a,b∈F q , q is a large prime number in finite positive integers, which satisfies the constant of 4a 3 +27b 2 ≠0; (A2)可信方通过保密信道发送指定单源网络编码中代的标识符I给单源网络编码的源节点:(A2) The trusted party sends the identifier I of the designated generation in the single-source network coding to the source node of the single-source network coding through the confidential channel: I={I1,I2,…,In}I= { I 1 ,I 2 ,...,In } 其中n是有限的正整数;where n is a finite positive integer; (A3)可信方选取密码学安全的Hash函数HG(A3) The trusted party selects a cryptographically secure Hash function H G : {0,1}*→G1 {0,1} * →G 1 其中G1是阶为大素数q的加法循环群;where G 1 is an additive cyclic group of order large prime q; (A4)可信方选择α,α∈(1,2,...,t),t是可信方选取基点G的阶且为有限正整数中的素数;确定单源网络编码中代的私钥SSK、椭圆曲线签名的私钥K、椭圆曲线签名的公钥P:(A4) The trusted party chooses α, α∈(1,2,...,t), where t is the order of the base point G selected by the trusted party and is a prime number in the finite positive integers; determine the generation in the single-source network coding Private key S SK , private key K for elliptic curve signature, and public key P for elliptic curve signature: SSK=α·HG(I)S SK =α·H G (I) K=η·SSK K=η·S SK P=K·GP=K·G 其中η∈{1,2,...,q}是可信机构选取的秘密随机数,G为椭圆曲线E上的一个基点,HG(I)是代标识的哈希值;where η∈{1,2,...,q} is the secret random number selected by the trusted authority, G is a base point on the elliptic curve E, and H G (I) is the hash value of the proxy identifier; (A5)可信方选取密码学安全的Hash函数h为:(A5) The trusted party selects the cryptographically secure Hash function h as: {0,1}*→Zq {0,1} * →Z q 其中Zq∈{1,2,...,q};where Z q ∈ {1,2,...,q}; (A6)可信方公开系统参数z:(A6) The trusted party discloses the system parameter z: z=(E,Fq,G,q,t,h,P,HG);z=(E, Fq ,G,q,t,h,P, HG ); B、生成单源网络编码的私钥K0和公钥P0 B. Generate the private key K 0 and public key P 0 of single-source network coding (B1)确定单源网络编码的源节点的私钥K0和公钥P0(B1) Determine the private key K 0 and public key P 0 of the source node of the single-source network coding: K0=η0·SSK K 00 ·S SK P0=K0·GP 0 =K 0 ·G 其中η0∈{1,2,...,t}是可信方选取的秘密随机数;where η 0 ∈{1,2,...,t} is the secret random number chosen by the trusted party; (B2)确定单源网络编码的中间节点的私钥Kid和公钥Pid(B2) Determine the private key K id and public key P id of the intermediate node of the single-source network coding: Kid=ηid·SSK K idid ·S SK Pid=Kid·GP id =K id ·G 其中ηid为可信方选取的秘密随机数,ηid∈(1,2,...,t),id是1,2,...,e,e是中间节点数量;where η id is the secret random number selected by the trusted party, η id ∈(1,2,...,t), id is 1,2,...,e, and e is the number of intermediate nodes; C、确定消息的哈希值C. Determine the hash value of the message 源节点产生的消息M被划分成m个模块M1,M2,...,Mm,每个模块均为n维向量,表示为:The message M generated by the source node is divided into m modules M 1 , M 2 ,..., M m , each module is an n-dimensional vector, expressed as:
Figure FDA0003350575130000021
Figure FDA0003350575130000021
将所有的模块扩展成一个m+n维的向量ViExpand all modules into an m+n-dimensional vector V i : Vi=(vi,1,vi,2,...,vi,m+n)V i =(vi ,1 ,vi ,2 ,...,vi ,m+n ) 其中i∈{1,2,…,m},确定消息向量Vi的哈希函数值:where i∈{1,2,…,m}, determine the hash function value of the message vector V i :
Figure FDA0003350575130000022
Figure FDA0003350575130000022
其中Rj为源节点随机选择椭圆曲线上的一组基点集且阶均为t;where R j is a set of base points randomly selected by the source node on the elliptic curve and the order is t; D、在单源网络编码的源节点上进行椭圆曲线签名D. Elliptic curve signature on the source node of single-source network coding (D1)可信方随机选择K′0∈{1,2,…,t},确定X0(D1) The trusted party randomly selects K′ 0 ∈{1,2,…,t} to determine X 0 : X0=h(Vi,K′0)·GX 0 =h(V i ,K′ 0 )·G 式中X0是椭圆曲线上的点(x0,y0);where X 0 is a point (x 0 , y 0 ) on the elliptic curve; (D2)确定源节点的r0,S0(D2) Determine r 0 , S 0 of the source node: r0=x0modtr 0 =x 0 modt S0=(h(Vi,K′0)+r0-h(Vi)K0)modtS 0 =(h(V i ,K′ 0 )+r 0 -h(V i )K 0 )modt (D3)确定源节点的签名σ0(D3) Determine the signature σ 0 of the source node: σ0=(r0,S0,HG(I))σ 0 =(r 0 ,S 0 ,H G (I)) (D4)将消息向量Vi、消息的哈希值h(Vi)、消息的签名σ0发送给单源网络编码的中间节点或宿节点;(D4) Send the message vector V i , the hash value h(V i ) of the message, and the signature σ 0 of the message to the intermediate node or sink node of single-source network coding; E、消息组合E. Message composition (E1)单源网络编码的中间节点将消息组合为:(E1) The intermediate nodes of single-source network coding combine the messages as:
Figure FDA0003350575130000031
Figure FDA0003350575130000031
其中a是消息的全局编码向量,a=(a1,a2,...,am),i是有限的正整数;where a is the global encoding vector of the message, a=(a 1 ,a 2 ,...,am ), i is a finite positive integer; (E2)确定组合消息w的哈希函数值h(w):(E2) Determine the hash function value h(w) of the combined message w:
Figure FDA0003350575130000032
Figure FDA0003350575130000032
其中m是有限的正整数;where m is a finite positive integer; F、在单源网络编码的中间节点上进行椭圆曲线签名F. Elliptic curve signature on the intermediate node of single-source network coding (F1)可信方随机选择K′id∈{1,2,…,t},确定Xid(F1) The trusted party randomly selects K′ id ∈ {1,2,…,t} to determine X id : Xid=h(w,K′id)·GX id =h(w,K' id )·G 式中Xid是椭圆曲线上的点(xid,yid);where X id is a point on the elliptic curve (x id , y id ); (F2)确定中间节点rid,Sid:(F2) Determine the intermediate nodes r id , S id : rid=xidmodtr id = x id modt Sid=(h(w,K′id)+rid-h(w)Kid)modtS id =(h(w,K' id )+r id -h(w)K id )modt (F3)中间节点的签名σid(F3) The signature σ id of the intermediate node: σid=(rid,Sid,H′G(I))σ id = (r id , S id , H′ G (I)) G、接收者进行签名验证G. The recipient performs signature verification (G1)接收者验证HG(I)=H′G(I)是否成立,如果成立接受签名,否则,拒绝签名;(G1) The receiver verifies whether H G (I)=H′ G (I) is established, if it is established, the signature is accepted, otherwise, the signature is rejected; (G2)确定接收者的U1,U2(G2) Determine the receiver's U 1 , U 2 : U1=(Sid-rid)modtU 1 =(S id -r id )modt U2=h(w)modtU 2 =h(w)modt (G3)接收者确定X:(G3) The receiver determines X: X=U1G+U2Pid X=U 1 G+U 2 P id X是椭圆曲线上的点(x′id,y′id);X is a point on the elliptic curve (x' id , y' id ); (G4)接收者确定V′:(G4) The receiver determines V': V′=x′idmodtV'=x' id modt (G5)接收者验证V′=rid是否成立,如果成立椭圆曲线签名成功;否则椭圆曲线签名失败。(G5) The receiver verifies whether V′=r id is established, if established, the elliptic curve signature succeeds; otherwise, the elliptic curve signature fails.
CN201910326163.1A 2019-04-23 2019-04-23 A method for elliptic curve signature in single-source network coding environment Active CN110086628B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910326163.1A CN110086628B (en) 2019-04-23 2019-04-23 A method for elliptic curve signature in single-source network coding environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910326163.1A CN110086628B (en) 2019-04-23 2019-04-23 A method for elliptic curve signature in single-source network coding environment

Publications (2)

Publication Number Publication Date
CN110086628A CN110086628A (en) 2019-08-02
CN110086628B true CN110086628B (en) 2022-02-25

Family

ID=67416166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910326163.1A Active CN110086628B (en) 2019-04-23 2019-04-23 A method for elliptic curve signature in single-source network coding environment

Country Status (1)

Country Link
CN (1) CN110086628B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314081A (en) * 2020-01-16 2020-06-19 西安邮电大学 A Lightweight Elliptic Curve Digital Signature Method for IoT Devices

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101300570A (en) * 2005-11-04 2008-11-05 微软公司 Microsoft corp
WO2018200215A1 (en) * 2017-04-26 2018-11-01 Visa International Service Association Systems and methods for recording data representing multiple interactions

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IT201600076089A1 (en) * 2016-07-20 2018-01-20 St Microelectronics Srl PROCEDURE FOR THE GENERATION OF A DIGITAL SIGNATURE OF A MESSAGE, CORRESPONDING GENERATION UNITS, ELECTRONIC EQUIPMENT AND COMPUTER PRODUCT

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101300570A (en) * 2005-11-04 2008-11-05 微软公司 Microsoft corp
WO2018200215A1 (en) * 2017-04-26 2018-11-01 Visa International Service Association Systems and methods for recording data representing multiple interactions

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
Aaram Yun ; Jung Hee Cheon ; ."On Homomorphic Signatures for Network Coding".《IEEE Transactions on Computers》.2010, *
Ely Porat ; Erez Waisbard."Efficient signature scheme for network coding".《2012 IEEE International Symposium on Information Theory Proceedings》.2012, *
Liu Guangjun ; Wang Bin."Secure network coding against intra/inter-generation pollution attacks".《China Communications 》.2013, *
Zhen Cheng ; Kaikai Chi."Secure network coding based on homomorpuic signature against pollution attacks".《2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems》.2013, *
俞惠芳 ; 高新哲."多源网络编码同态环签名方案研究".《信息网络安全》.2019, *
多源网络编码签名;杨铭熙等;《中国通信》;20100115(第01期);全文 *
张玉洁 ; 蔡英 ; 李卓."网络编码中抗污染攻击研究".《北京信息科技大学学报(自然科学版)》.2013, *
蒙云番 ; 孙光昊 ; ."基于网络编码和ECC的无线体域网安全签名方案".《电讯技术》.2015, *

Also Published As

Publication number Publication date
CN110086628A (en) 2019-08-02

Similar Documents

Publication Publication Date Title
Catalano et al. Efficient network coding signatures in the standard model
US7443980B2 (en) Hierarchical identity-based encryption and signature schemes
CN109962769B (en) Data security deduplication method based on threshold blind signature
CN110138543B (en) Blind signcryption method under lattice public key cryptosystem
CN109639439B (en) ECDSA digital signature method based on two-party cooperation
CN104301108B (en) It is a kind of from identity-based environment to the label decryption method without certificate environment
CN110233725B (en) A homomorphic certificateless signature method for multi-source network coding
CN110995412B (en) Certificateless ring signcryption method based on multiplicative group
CN104168114A (en) Distributed type (k, n) threshold certificate-based encrypting method and system
CN105025474B (en) Lightweight digital signature method for wireless sensor network
Li et al. Privacy‐preserving multi‐receiver signcryption scheme for heterogeneous systems
Noh et al. Strong designated verifier signature scheme from lattices in the standard model
CN110086630B (en) A Generating Method of Digital Signature Based on Edwards Curve
CN113079021B (en) Lattice-ring signcryption method based on certificateless network coding
CN111262710B (en) Certificate-free aggregation digital signature method for resisting secret information leakage
CN113162773A (en) Heterogeneous blind signcryption method capable of proving safety
CN110086628B (en) A method for elliptic curve signature in single-source network coding environment
Ming et al. Cryptanalysis of an Identity Based Signcryption Scheme in the Standard Model.
Zheng et al. Threshold attribute‐based signcryption and its application to authenticated key agreement
CN110011806B (en) Multiple homomorphic signature method under multi-source network coding mechanism
Meng Directly revocable ciphertext-policy attribute-based encryption from lattices
Sarier A new biometric identity based encryption scheme secure against DoS attacks
CN114465733A (en) Secure network coding method based on improved RSA
AlDerai et al. A Study of Image Encryption/Decryption by Using Elliptic Curve Cryptography ‘ECC,’
CN115549896B (en) Efficient heterogeneous signcryption method based on lattice cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20190802

Assignee: Beijing Shengbang Saiyun Technology Co.,Ltd.

Assignor: XI'AN University OF POSTS & TELECOMMUNICATIONS

Contract record no.: X2022980018056

Denomination of invention: Elliptic Curve Signature in Single Source Network Coding Environment

Granted publication date: 20220225

License type: Common License

Record date: 20221012

EE01 Entry into force of recordation of patent licensing contract