Verifying digital signature based on shared knowledge
First Claim
1. A method of verifying, by a second party, a digital signature of a first party that was generated using an elliptic curve digital signature algorithm, the method comprising:
- (a) receiving a public key from the first party,(b) receiving a digital signature from the first party, the digital signature being for an electronic message;
(c) identifying domain parameters of an elliptic curve used in elliptic curve cryptography, including identifying a generating point of the elliptic curve;
(d) transforming said identified generating point of said (c) into a second generating point as a deterministic function of shared knowledge known to the first party and the second party; and
(e) verifying, by the second party, said received digital signature as a function of said received public key, the electronic message, and said identified domain parameters of said (c), in which the second generating point of said (d) is substituted for said identified generating point of said (c),wherein the above steps are performed by at least one computer processor.
6 Assignments
0 Petitions
Accused Products
Abstract
A method of verifying a digital signature of a first party that was generated using an elliptic curve digital signature algorithm (ECDSA) includes the steps of receiving a public key from the first party; receiving a digital signature from the first party, the digital signature being for an electronic message; identifying domain parameters of an elliptic curve used in elliptic curve cryptography, including identifying a generating point of the elliptic curve; transforming the identified generating point into a second generating point as a deterministic function of shared knowledge known to and between the first party and a second party; and verifying the received digital signature as a deterministic function of the received public key, the electronic message, and the identified domain parameters, in which the second generating point is substituted for the identified generating point.
121 Citations
14 Claims
-
1. A method of verifying, by a second party, a digital signature of a first party that was generated using an elliptic curve digital signature algorithm, the method comprising:
-
(a) receiving a public key from the first party, (b) receiving a digital signature from the first party, the digital signature being for an electronic message; (c) identifying domain parameters of an elliptic curve used in elliptic curve cryptography, including identifying a generating point of the elliptic curve; (d) transforming said identified generating point of said (c) into a second generating point as a deterministic function of shared knowledge known to the first party and the second party; and (e) verifying, by the second party, said received digital signature as a function of said received public key, the electronic message, and said identified domain parameters of said (c), in which the second generating point of said (d) is substituted for said identified generating point of said (c), wherein the above steps are performed by at least one computer processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. In a method of verifying a digital signature of a first party by a second party as a function of a public key, an electronic message, and domain parameters of an elliptic curve, including a generating point of the curve, wherein the digital signature was generated with an elliptic curve digital signature algorithm, an improvement to the method characterized by,
(a) calculating a larger integer value as a deterministic function of shared knowledge that is known to the first party and the second party, (b) transforming the generating point of the domain parameters into a new generating point by multiplying the generating point of the domain parameters by said calculated integer value to obtain the new generating point, and (c) replacing the generating point of the domain parameters with the new generating point in said step of verifying the digital signature as a function of the public key, electronic message, and the domain parameters, wherein the above steps are performed by one or more computer processors.
Specification