Signature Apparatus, Verifying Apparatus, Proving Apparatus, Encrypting Apparatus, and Decrypting Apparatus
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are a signature apparatus, a verifying apparatus, a proving apparatus, an encrypting apparatus, and a decrypting apparatus capable of efficiently reducing a signature text counterfeit problem to a discrete logarithm problem. The commitment is a hash value of a set of a value to be committed. Data including a pair of elements of a cyclic group associated with a discrete logarithm problem is used as a public key, and a discrete logarithm of an order of the pair is used as a secret key. Accordingly, it is possible to summarize secret information of an attacker from the commitment without rewinding the attacker and to ensure a higher safety than that of a Schnorr signature scheme. In addition, one-time power residue calculation is performed in each of the signature and verification calculations, so that it is possible to lower an amount of calculation in the signature and verification calculations.
12 Citations
78 Claims
-
1-40. -40. (canceled)
-
41. A signature apparatus for generating a signature text by using a commitment, wherein the commitment is a hush value of a set including a value to be committed, data including a pair of elements of a cyclic group associated with a discrete logarithm problem is used as a public key, and a discrete logarithm of an order of the pair is used as a secret key, the signature apparatus comprising:
-
committed vector selecting means which selects a committed vector associated with a first commitment; first commitment calculating means which calculates the first commitment; basis vector calculating means which calculates a basis vector; second commitment calculating means which calculates the power residue and calculates a second commitment; vector challenge calculating means which calculates a vector challenge; vector response calculating means which calculates a vector response by using the first commitment, a set used for calculating the power residue, the vector challenge, and the basis vector; and a storage unit which stores the committed vector, the first commitment, the basis vector, the second commitment, the vector challenge, and the vector response, wherein the basis vector and the vector challenge are hash values. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 66, 67, 68, 69, 70, 71, 74, 75, 76)
-
-
55. A verifying apparatus for determining a validity of an input data,
wherein the input data includes a message and a signature text associated with the message, only if the data is valid, the data is accepted, first commitments are used for verification calculation, and a power residue is performed the number of times less than the number of the first commitments, if the validity of the data is authenticated, the first commitments are hash values of data including components of a vector response which is a portion of the data, a public key is data including a pair of elements of a cyclic group associated with a discrete logarithm problem, and a secret key is a discrete logarithm of an order of the pair.
Specification