Digital signature system based on certificate and endorsement method
Technical field
The present invention relates to the digital signature technology of network security, refer to especially a kind of digital signature system based on certificate and digital signature method safely and efficiently.
Background technology
Along with the develop rapidly of computer network and the communication technology, the mankind progressively march toward informationized society, and digitlization, networking will become the basic platform that global IT application is new.In social informatization process, the development of the Internet is very easy to people's study, work and life, and computer application has been penetrated into the every field of the societies such as politics, economy, military affairs, science and culture and family life.Unconsciously, information becomes most important a kind of resource and wealth, but because the processes such as the transmission of information, storage, processing are carried out often on open communication network, so information is easily subject to the threat of the various attack means such as eavesdropping, intercepting, amendment, forgery, playback.
Digital signature is as ensureing one of means of the network information security, can effectively solve in network information transfer and forge, deny, pretend to be and distort problem, it is one of core technology realizing electronic safety transaction, there is important effect at aspects such as the fail safe, authenticity and the non repudiations that ensure to conclude the business, because of but one of information security core technology all has important using value in fields such as encryption key distribution, e-bank, electronics security, e-commerce and e-governments.
Traditional digital signature system is based on PKIX, what adopt is the authentication mode of certificate, the certificate of issuing by authenticating authority mechanism (CA) is realized the binding of client public key and identity information, thereby ensures the authentic and valid of client public key.Certificate management comprises the cancelling of certificate, stores, renewal etc., needs very large amount of calculation and storage capacity, particularly certificate revocation problem.In addition, traditional PKI technology also exists third party to inquire problem.So-called third party's inquiry, refers to that third party is before certain user's of use PKI, and the certificate status that need to inquire to CA this user, with the true and validity of verification public key.This method expends the plenty of time, space and calculating, is once becoming the obstacle of common key cryptosystem development.
In order to simplify the problems such as the administration overhead of digital certificate, first Shamir in 1984 have proposed the concept of the cryptographic system based on identity.Based on the cryptographic system of identity, do not need to preserve each user's public key certificate, also store all users' PKI without the need for a public file, each user's PKI is directly to be generated by his identity, user's identity can be his name, telephone number, ID card No., mailing address or E-mail address etc., and user's private key is to produce by trusted party (PKG) is unified.Although the cryptographic system based on identity has overcome the certificate management problem existing in conventional public-key cryptographic system, but owing to still needing a trusted party to produce and issue user's private key, thereby exist intrinsic key escrow, it is the private key that trusted party is known any user, thereby can eavesdrop any user's communication, and then can decipher any user's ciphertext or forge any user's signature.
In order to overcome the key escrow in the cryptographic system based on identity, Gentry has proposed the public-key cryptosystem (CBC:Certificate-based Cryptography) of the system of a new public key cryptography-based on certificate in European cryptography meeting in 2003, this system is by the advantages of traditional public-key cryptosystem and the cryptographic system based on identity, eliminate the certification authentication process of high cost, and do not had the hidden danger of key escrow.Certificate in public-key cryptosystem based on certificate has the repertoire of certificate in conventional public-key cryptographic system, and in deciphering and signature process as the part of private key, thereby encrypt and signature-verification process in do not exist the third party of certificate status inquired.And in the public-key cryptosystem based on certificate, the transmission of certificate does not need by safe lane, does not have the problem of key distribution.Although the research of the digital signature scheme based on certificate makes progress to some extent, more or less there are some problem and shortage at the aspect such as security intensity, operational efficiency in the current digital signature method based on certificate.
Based on above analysis, the inventor carries out Improvement for the existing digital signature method based on certificate, and this case produces thus.
Summary of the invention
Object of the present invention, be to provide a kind of digital signature system and endorsement method based on certificate, it does not use traditional bilinearity to mapping in signature process and proof procedure, under the prerequisite that ensures fail safe, has less calculation cost and communication cost, has improved the operational efficiency of system.
Another object of the present invention, is to provide a kind of digital signature system and endorsement method based on certificate, and it can reduce calculation cost and the communication cost of the digital signature method based on certificate, improves the operation efficiency of the digital signature method based on certificate.
In order to reach above-mentioned purpose, solution of the present invention is:
Based on a digital signature system for certificate, comprise system parameter setting module, user key generation module, user certificate authentication module, signature blocks and authentication module;
System parameter setting module, for generation system master key and the open parameter of system, and system master key is sent to user certificate authentication module, open system parameter is sent to user key generation module, user certificate authentication module, signature blocks and authentication module;
User key generation module, for generating each user's PKI and private key pair, and sends to user certificate authentication module and authentication module by user's PKI, and user's private key is sent to signature blocks;
User certificate authentication module, the open parameter of the system master key sending by system parameter setting module and system, identity and PKI to user are signed, and produce user's certificate, and user's certificate is sent to signature blocks;
Signature blocks, the user certificate that the private key for user sending by user key generation module and user certificate authentication module are issued, signs to message, and the signature of generation is sent to authentication module;
Authentication module, the client public key that the open parameter of the system sending by system parameter setting module and user key generation module send, the validity of the signature that signature blocks is produced is verified.
Based on a digital signature method for certificate, comprise the following steps:
A: the master key msk of the open parameter p arams of initialization system and system;
B: the PKI PK that generates user according to the open parameter p arams of described system
iDwith private key usk
iD;
C: according to the open parameter p arams of described system, user's identity ID, system master key msk and user's PKI PK
iDproduce user's certificate Cert
iD;
D: according to user's private key usk
iDcertificate Cert with user
iDmessage m is signed and obtained σ;
E: according to the open parameter p arams of described system and user's PKI PK
iDthe validity of the signature sigma to message m is verified.
Above-mentioned steps A specifically comprises:
A1: choose two large prime number p and q and meet q|p-1;
A2: choose at random
a generator g, choose a crash-resistant hash hash function H;
A3: choose at random x
computing system Your Majesty key y=g
xmodp;
The open parameter p arams of system is < p, q, and g, y, H >, system master key msk is x.
In above-mentioned steps A2, selected hash hash function H selects hash function MD-5, SHA-1, SHA-2 or SHA-3.
Above-mentioned steps B specifically comprises:
B1: choose at random x
iD as user's private key usk
iD;
B2: calculate
as user's PKI.
Above-mentioned steps C specifically comprises:
C1: choose at random s
calculate W=g
smodp;
C2: calculate R=s+xH (ID, PK
iD, W) and modq, obtain user's certificate Cert
iD=< W, R >.
Above-mentioned steps D specifically comprises:
D1: choose at random r
calculate U=g
rmodp;
D2: calculate h
1=H (m, PK
iD, U, W) and h
2=H (m, ID, PK
iD, U, W);
D3: calculate z=R+x
iDh
1+ rh
2modq, obtaining signature corresponding to message m is σ=< U, W, z >.
Above-mentioned steps E specifically comprises:
E1: calculate h
0=H (ID, PK
iD, W), h
1=H (m, PK
iD, U, W) and h
2=H (m, ID, PK
iD, U, W);
E2: checking equation
whether set up, if equation is set up, accept signature, otherwise, refusal signature.
Adopt after such scheme, the present invention, in the situation that ensureing signature safety, has reduced calculation cost and the communication cost of signature scheme, has improved the treatment effeciency of signature server, having saved the calculation resources of signature server, is a kind of new digital signature method safely and efficiently.
Brief description of the drawings
Fig. 1 is the digital signature system schematic diagram that the present invention is based on certificate;
Fig. 2 is the flow chart that the present invention is based on the digital signature method of certificate;
Fig. 3 is that the present invention is applied to the schematic diagram based on component property remote proving system.
Embodiment
Below with reference to accompanying drawing, technical scheme of the present invention is elaborated.
As shown in Figure 1, comprise system parameter setting modules A, user key generation module B, user certificate authentication module C, signature blocks D and authentication module E according to the digital signature system that the present invention is based on certificate.
Wherein, system parameter setting modules A is for generation system master key msk and the open parameter p arams of system, and system master key msk is sent to user certificate authentication module C, open system parameter p arams is sent to respectively to user key generation module B, user certificate authentication module C, signature blocks D and authentication module E.
User key generation module B is for generating each user's PKI PK
iDwith private key usk
iD, and by user's PKI PK
iDsend to user certificate authentication module C and authentication module E, by user's private key usk
iDsend to signature blocks D.
The system master key msk that user certificate authentication module C sends by system parameter setting modules A and system open parameter p arams, the identity ID to validated user and PKI PK
iDsign, produce user's certificate Cert
iD, and by user's certificate Cert
iDsend to signature blocks.
The private key for user usk that signature blocks D sends by user key generation module B
iDthe user certificate Cert issuing with user certificate authentication module C
iD, message m is signed, and the signature sigma of generation is sent to authentication module E.
The client public key PK that the open parameter p arams of system that authentication module E sends by system parameter setting modules A and user key generation module B send
iD, the validity of the signature sigma that signature blocks D is produced is verified.
Flow chart below in conjunction with digital signature method is specifically described the operation of the modules in this digital signature system.
As shown in Figure 2, this system parameter setting modules A is carried out following steps:
A1: choose two large prime number p and q and meet q|p-1, wherein p is the integer of 1024, and q is the integer of 160;
A2: choose at random
a generator g, choose SHA-1 as crash-resistant hash function H ();
A3: choose at random x
computing system Your Majesty key y=g
xmodp.
Comprehensive above-mentioned information, the open parameter p arams of system parameter setting modules A retrieval system is < p, q, g, y, H >, system master key msk is x.
This user key generation module B carries out following steps:
B1: choose at random xID
as user's private key usk
iD;
B2: calculate
as user's PKI.
This user certificate authentication module C carries out following steps:
C1: choose at random s
calculate W=g
smodp;
C2: calculate R=s+xH (ID, PK
iD, W) and modq, obtain user's certificate Cert
iD=< W, R >.
This signature blocks D carries out following steps:
D1: choose at random r
calculate U=g
rmodp;
D2: calculate h
1=H (m, PK
iD, U, W) and h
2=H (m, ID, PK
iD, U, W);
D3: calculate z=R+x
iDh
1+ rh
2modq, obtaining signature corresponding to message m is σ=< U, W, z >.
This authentication module E carries out following steps:
E1: calculate h
0=H (ID, PK
iD, W), h
1=H (m, PK
iD, U, W), h
2=H (m, ID, PK
iD, U, W);
E2: checking equation
whether set up, if equation is set up, accept signature, otherwise, refusal signature.
To the situation being applied in the remote proving system based on component property trusted terminal according to the digital signature system based on certificate of the present invention as above be described below.
To prove one of valuable feature function that the credible remote proving as target of computing platform is credible calculating, be subjected to the extensive concern of domestic and international scientific research institution.Along with the development of remote proving, there is the remote proving scheme (component property-based attestation is called for short CPBA) based on component property.
In the remote proving based on component property (CPBA) method, issuing, cancel and verifying of component property certificate all used traditional PKI method to realize.Therefore, the efficiency that component property proves is lower, and when particularly the attribute of large quantity assembly proof, calculating and communication cost are larger, are not particularly suitables.According to the digital signature method based on certificate efficiently of the present invention, not only can and cancel for the certificate issued of credible platform (TPM) new method is provided, and to can be used for credible calculating platform proof of identification method be the structure of privacy CA (Pricacy-CA), thereby can form more practical remote certification method.
As shown in Figure 3, the improved remote proving system based on component property comprises assembly production firm, user platform, ISP, these 4 roles of certificate issuance authoritative institution.Except assembly production firm, the remote proving process that other 3 participation of roles component propertys prove.We represent each participant in system with following symbol:
CA: certificate issuance authoritative institution (Certificate Authority), the algorithm in main execution graph 1 system parameter setting modules A and user certificate authentication module C, be responsible for system parameters generation and issue, cancel component property certificate;
USER: user platform, comprise main frame (HOST) and credible platform module (TPM) two parts, the algorithm in main execution graph 1 user key generation module B and signature blocks D, belongs to the certifier in identification protocol;
SP: ISP (Service Provider), the algorithm in main execution graph 1 authentication module E, proposes attribute demand of proof, and Verification Components attribute proves.
The remote proving scheme (CPBA) based on component property of credible calculating platform is that attribute authority (aa) mechanism is the Attribute certificate that various types of components is issued, Attribute certificate and the common issue of soft and hardware binding, platform certifier proves that to ISP its current operation configuration status meets certain security attribute according to the component property certificate of configuration and the integrity measurement of TPM.The improved remote proving scheme based on component property does not need third party to inquire, has improved the efficiency of the remote proving system based on component property.Architecture by Fig. 3 can find out, improved CPBA proves to be made up of following steps:
Initialization (Setup): by the algorithm in certificate issuance authoritative institution (CA) execution graph 1 system parameter setting modules A, the open parameter p arams of generation system master key msk and system, and open system parameter p arams is sent to respectively to USER and SP;
Registration (Register): by the algorithm in user platform (USER) execution graph 1 user key generation module B, generate the PKI PK of user platform
iDwith private key usk
iD, and by PK
iDsend to CA and SP with platform component property, then CA carries out the algorithm in user certificate authentication module C, for user platform component property is issued certificate Cert
iD;
Prove (Attest): user platform (comprising HOST and TPM) is according to ISP's (SP) proof request, and the algorithm in execution graph 1 signature blocks D, with the private key usk of oneself
iDwith certificate Cert
iDcomputing platform component property signature sigma, then sends signature sigma to SP and carries out remote proving;
Checking (Verify): by the algorithm in ISP (SP) execution graph 1 authentication module E, with the open parameter p arams of system and user platform PKI PK
iDplatform assembly attribute signature sigma is verified.
The improved remote proving system based on component property trusted terminal has been introduced the digital signature scheme based on certificate, has eliminated third party's inquiry of certificate, has reduced calculation cost and the communication cost of system, has improved the efficiency of remote proving system.
Concerning those skilled in the art, can associate easily other advantage and distortion according to above implementation type.Therefore, the present invention is not limited to above-mentioned specific embodiment, and it carries out detailed, exemplary explanation as just example to a kind of form of the present invention.Not deviating from the scope of aim of the present invention, those of ordinary skill in the art can according to above-mentioned specific embodiment by various be equal to that technical scheme that replacement obtains all should be included in the scope of claim of the present invention and the scope that is equal within.