CRYPTOGRAPHIC MESSAGE SIGNATURE METHOD HAVING STRENGTHENED SECURITY, SIGNATURE VERIFICATION METHOD, AND CORRESPONDING DEVICES AND COMPUTER PROGRAM PRODUCTS
First Claim
1. A cryptographic message signature method having strengthened security, comprising:
- implementing two sets of signature algorithms SA1={K1, S1, V1} and SA2={K2, S2, V2}, where K1 and K2 are key generation algorithms, S1 and S2 are signature generation algorithms and V1 and V2 are signature verification algorithms, and wherein the step of implementing includes;
a step of generating permanent keys using the algorithm K1, delivering a pair of private and public keys {sk1, pk1};
and, for at least one message m to be signed;
a signature step including the following sub-steps;
receipt of said message m to be signed;
generation of an ephemeral key pair {sk2,pk2} using the algorithm K2, where sk2 is a private key and pk2 is a public key;
calculation, by the signature algorithm S2, of a signature s2 of the message m by the private key sk2;
calculation, by the signature algorithm S1, of a signature c1 of the public key pk2 by the private key sk1; and
providing the strengthened signature {s2, c1, pk2}.
1 Assignment
0 Petitions
Accused Products
Abstract
A cryptographic message signature method are provided, which have strengthened security. The method implements two sets of signature algorithms SA1={K1, S1, V1} and SA2={K2, S2, V2}, where Ki, Si and Vi are key generation algorithms, signature generation algorithms and signature verification algorithms, respectively. The method includes: a step of generating permanent keys using the algorithm K1, delivering a pair of private and public keys {sk1, pk1}; and, for at least one message m to be signed: a signature step including sub-steps. The sub-steps include: receipt of the message m to be signed; generation of an ephemeral key pair {sk2,pk2} using the algorithm K2; calculation, by the signature algorithm S2, of the signature s2 of the message m by the private key sk2; calculation, by the signature algorithm S1, of the signature c1 of the public key pk2 by the private key sk1; and providing the strengthened signature {s2, c1, pk2}.
15 Citations
16 Claims
-
1. A cryptographic message signature method having strengthened security, comprising:
-
implementing two sets of signature algorithms SA1={K1, S1, V1} and SA2={K2, S2, V2}, where K1 and K2 are key generation algorithms, S1 and S2 are signature generation algorithms and V1 and V2 are signature verification algorithms, and wherein the step of implementing includes; a step of generating permanent keys using the algorithm K1, delivering a pair of private and public keys {sk1, pk1}; and, for at least one message m to be signed; a signature step including the following sub-steps; receipt of said message m to be signed; generation of an ephemeral key pair {sk2,pk2} using the algorithm K2, where sk2 is a private key and pk2 is a public key; calculation, by the signature algorithm S2, of a signature s2 of the message m by the private key sk2; calculation, by the signature algorithm S1, of a signature c1 of the public key pk2 by the private key sk1; and providing the strengthened signature {s2, c1, pk2}. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A cryptographic message signature device having strengthened security, wherein the device comprises:
-
means for implementing two sets of signature algorithms SA1={K1, S1, V1} and SA2={K2, S2, V2}, where K1 and K2 are key generation algorithms, S1 and S2 are signature generation algorithms and V1 and V2 are signature verification algorithms, and wherein the means for implementing comprises; means for generating permanent keys, using the algorithm K1, thereby delivering a pair of private and public keys {sk1, pk1}; and, for at least one message m to be signed; signature means including; means for receiving of said message m to be signed; means for generating of an ephemeral key pair {sk2,pk2} using the algorithm K2, where sk2 is a private key and pk2 is a public key; means for calculating, by the signature algorithm S2, a signature s2 of the message m by the private key sk2; means for calculating, by the signature algorithm S1, a signature c1 of the public key pk2 by the private key sk1; means for providing the strengthened signature {s2, c1, pk2}. - View Dependent Claims (13, 14)
-
-
15. A computer program product recorded on a computer readable medium and executable by a processor, wherein the product includes program code instructions for implementing a cryptographic message signature method having strengthened security, wherein the method comprises:
-
implementing two sets of signature algorithms SA1={K1, S1, V1} and SA2={K2, S2, V2}, where K1 and K2 are key generation algorithms, S1 and S2 are signature generation algorithms and V1 and V2 are signature verification algorithms, and wherein the step of implementing includes; a step of generating permanent keys using the algorithm K1, delivering a pair of private and public keys {sk1, pk1}; and, for at least one message m to be signed; a signature step including the following sub-steps; receipt of said message m to be signed; generation of an ephemeral key pair {sk2,pk2} using the algorithm K2, where sk2 is a private key and pk2 is a public key; calculation, by the signature algorithm S2, of a signature s2 of the message m by the private key sk2; calculation, by the signature algorithm S1, of a signature c1 of the public key pk2 by the private key sk1; and providing the strengthened signature {s2, c1, pk2}.
-
-
16. A computer program product recorded on a computer readable medium and executable by a processor, wherein the product includes program code instructions for implementing a cryptographic message signature verification method having strengthened security, wherein the method comprises:
-
implementing two signature verification algorithms V1 and V2, and a joint verification phase for signatures generated according to cryptographic message signature method, said verification phase including the following steps for a signed message m to be verified; receipt of a strengthened signature triplet {s2, c1, pk2}, where pk2 is a public key, s2 is a signature of the message m using a private key sk2, c1 is a signature of public key pk2 by a private key sk1; verification, using said verification algorithm V2 and said public key pk2, of the signature s2 of the message m, thereby delivering a first positive or negative result; verification, using said verification algorithm V1 and a public key pk1, of the signature c1 of the public key pk2, thereby delivering a second positive or negative result; delivering a positive result if the first and second results are positive.
-
Specification