Certificateless multi-proxy signature method and apparatus
09641340 ยท 2017-05-02
Assignee
Inventors
Cpc classification
H04L9/3066
ELECTRICITY
H04L63/0457
ELECTRICITY
International classification
H04L9/32
ELECTRICITY
H04L9/30
ELECTRICITY
Abstract
A certificateless multi-proxy signature method and apparatus, where the method may include computing, by a proxy signature device, a public key and a private key of the proxy signature device according to a public parameter, where the public key is corresponding to the private key, acquiring a verification result of a standard signature and determining, according to the verification result, whether the standard signature is valid, computing a partial proxy signature of the proxy signature device according to the private key if the verification result is used to represent that the standard signature is valid, and sending the partial proxy signature to a proxy signature device administrator, so that after the proxy signature device administrator obtains a multi-proxy signature through computation according to the partial proxy signature, a multi-proxy signature verification device verifies the multi-proxy signature.
Claims
1. A certificateless multi-proxy signature method, comprising: computing, by a proxy signature device, a public key and a private key of the proxy signature device according to a public parameter, wherein the public key is corresponding to the private key; acquiring a verification result of a standard signature; determining, according to the verification result, whether the standard signature is valid, wherein the standard signature comprises T and V, wherein T is obtained through computation by a standard signature computing device according to a formula T=rP, and wherein V is obtained through computation by the standard signature computing device according to a formula V=D.sub.a+x.sub.aH.sub.1(m,T,P.sub.a)+rH.sub.2(m,T,P.sub.a); computing a partial proxy signature of the proxy signature device according to the private key when the verification result is used to represent that the standard signature is valid; and sending the partial proxy signature to a proxy signature device administrator, so that after the proxy signature device administrator obtains a multi-proxy signature through computation according to the partial proxy signature, a multi-proxy signature verification device verifies the multi-proxy signature, wherein r is randomly selected from Z*.sub.q according to a formula rZ*.sub.q, wherein a is a sequence number of the standard signature computing device and 0al, wherein l is a quantity of standard signature computing devices plus one, wherein x.sub.a is a first sub-private key comprised in a private key of the standard signature computing device, wherein D.sub.a is a second sub-private key comprised in the private key of the standard signature computing device, wherein m is a message m input by a transmit end, wherein P.sub.a is a public key of the standard signature computing device, wherein the public parameter comprises H.sub.1(), H.sub.2(), and P, wherein P is a generator of G, and wherein G is a group G whose order is a prime number q.
2. The certificateless multi-proxy signature method according to claim 1, wherein the standard signature computing device is any one of: the proxy signature device; an original signature device; and another signature device except the original signature device and the proxy signature device, wherein the verification result is obtained after a standard signature verification device verifies the standard signature according to a formula VP=P.sub.pubH(ID.sub.a,P.sub.a)+P.sub.aH.sub.1(m,T,P.sub.a)+TH.sub.2(m,T,P.sub.a), wherein the standard signature verification device is any one of: the proxy signature device; the original signature device; and the another signature device except the original signature device and the proxy signature device, and wherein the standard signature verification device is different from the standard signature computing device, wherein ID.sub.a is an identifier of the standard signature computing device, and wherein the public parameter further comprises P.sub.pub.
3. The certificateless multi-proxy signature method according to claim 1, wherein computing, by the proxy signature device, the public key and the private key of the proxy signature device according to the public parameter comprises: selecting x.sub.i from Z*.sub.q randomly according to a formula x.sub.iZ*.sub.q; computing the public key according to a formula P.sub.i=x.sub.iP; and computing a second sub-private key according to a formula D.sub.i=sH(ID.sub.i,P.sub.i), wherein i (1in) is a sequence number of the proxy signature device, wherein n is a quantity of proxy signature devices, wherein x.sub.i is a first sub-private key comprised in the private key of the proxy signature device, wherein D.sub.i is the second sub-private key comprised in the private key of the proxy signature device, wherein P.sub.i is the public key of the proxy signature device, wherein ID.sub.i is an identifier of the proxy signature device, wherein s is a master key, and wherein the public parameter comprises H() and q.
4. The certificateless multi-proxy signature method according to claim 3, wherein computing the partial proxy signature of the proxy signature device according to the private key comprises: acquiring an authorization signature computed by the original signature device, wherein the authorization signature comprises , T.sub.0, and V.sub.0; verifying the authorization signature according to a formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0); selecting r.sub.i from Z*.sub.q randomly according to a formula r.sub.iZ*.sub.q when it is verified that the authorization signature is valid; computing T.sub.i according to a formula T.sub.i=r.sub.iP; and computing V.sub.i according to a formula V.sub.i=D.sub.i+x.sub.iH.sub.3(m,T.sub.i,P.sub.i)+r.sub.iH.sub.4(m,T.sub.i,P.sub.i), wherein the partial proxy signature comprises , T.sub.0, V.sub.0, T.sub.i, and V.sub.i, wherein comprises identity information of the proxy signature device and identity information of the original signature device, wherein T.sub.0 is obtained through computation by the original signature device according to a formula T.sub.0=r.sub.0P, wherein r.sub.0 is randomly selected by the original signature device from Z*.sub.q according to a formula r.sub.0Z*.sub.q, wherein V.sub.0 is obtained through computation by the original signature device according to a formula V.sub.0=D.sub.0+x.sub.0H.sub.1(,T.sub.0,P.sub.0)+r.sub.0H.sub.2(,T.sub.0,P.sub.0), wherein x.sub.0(Z*.sub.q) is a first sub-private key of the original signature device, wherein D.sub.0(=sH(ID.sub.0,P.sub.0)) is a second sub-private key of the original signature device, wherein ID.sub.0 is an identifier of the original signature device, wherein P.sub.0(=x.sub.0P) is a public key of the original signature device, wherein m is a message m input by an input end, and wherein the public parameter further comprises H.sub.3(), H.sub.4(), and P.sub.pub.
5. A certificateless multi-proxy signature method, comprising: acquiring, by a multi-proxy signature verification device, a multi-proxy signature after a standard signature verification device verifies that a standard signature is valid, wherein the standard signature comprises T and V, wherein T is obtained through computation by a standard signature computing device according to a formula T=rP, wherein V is obtained through computation by the standard signature computing device according to a formula V=D.sub.a+x.sub.aH.sub.1(m,T,P.sub.a)+rH.sub.2(m,T,P.sub.a), wherein the multi-proxy signature is obtained through computation by a proxy signature device administrator according to a partial proxy signature of each proxy signature device, and wherein the partial proxy signature is obtained through computation by the each proxy signature device according to a private key of the proxy signature device; and verifying the multi-proxy signature according to a public key of each proxy signature device, wherein r is randomly selected from Z*.sub.q according to a formula rZ*.sub.q, wherein a is a sequence number of the standard signature computing device, wherein 0al, wherein l is a quantity of standard signature computing devices plus one, wherein x.sub.a is a first sub-private key comprised in a private key of the standard signature computing device, wherein D.sub.a is a second sub-private key comprised in the private key of the standard signature computing device, wherein m is a message m input by a transmit end, wherein P.sub.a is a public key of the standard signature computing device, wherein the public parameter comprises H.sub.1(), H.sub.2(), and P, wherein P is a generator of G, and wherein G is a group G whose order is a prime number q.
6. The certificateless multi-proxy signature method according to claim 5, wherein P.sub.a is obtained through computation by the standard signature computing device according to a formula P.sub.a=x.sub.aP, wherein x.sub.a is randomly selected by the standard signature computing device from Z*.sub.q according to a formula x.sub.aZ*.sub.q, wherein D.sub.a is obtained through computation by the standard signature computing device according to a formula D.sub.a=sH(ID.sub.a,P.sub.a), wherein ID.sub.a is an identifier of the standard signature computing device, wherein s is a master key, and wherein the public parameter comprises H() and q.
7. The certificateless multi-proxy signature method according to claim 6, wherein the standard signature verification device verifies the standard signature according to a formula VP=P.sub.pubH(ID.sub.a,P.sub.a)+P.sub.aH.sub.1(m,T,P.sub.a)+TH.sub.2(m,T,P.sub.a), wherein the standard signature computing device is one of another signature device except an original signature device and the proxy signature device, and the original signature device, wherein the standard signature verification device is any one of: the proxy signature device; the original signature device; and the another signature device except the original signature device and the proxy signature device, wherein the standard signature verification device is different from the standard signature computing device, and wherein the public parameter further comprises P.sub.pub.
8. The certificateless multi-proxy signature method according to claim 7, wherein acquiring the multi-proxy signature comprises: determining whether the proxy signature device administrator verifies, according to the partial proxy signature of each proxy signature device, that both a formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0) and a formula V.sub.iP=P.sub.pubH(ID.sub.i,P.sub.i)+P.sub.iH.sub.3(m,T.sub.i,P.sub.i)+T.sub.iH.sub.4(m,T.sub.i,P.sub.i) hold; and computing the multi-proxy signature according to a formula =(,T.sub.MP,V.sub.MP) when the proxy signature device administrator verifies that both the formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0) and the formula V.sub.iP=P.sub.pubH(ID.sub.i,P.sub.i)+P.sub.iH.sub.3(m,T.sub.i,P.sub.i)+T.sub.iH.sub.4(m,T.sub.i,P.sub.i) hold, wherein V.sub.0 is obtained through computation by the original signature device according to a formula V.sub.0=D.sub.0+x.sub.0H.sub.1(,T.sub.0,P.sub.0)+r.sub.0H.sub.2(,T.sub.0,P.sub.0), wherein comprises identity information of the proxy signature device and identity information of the original signature device, wherein T.sub.0 is obtained through computation by the original signature device according to a formula T.sub.0=r.sub.0P, wherein r.sub.0 is randomly selected by the original signature device from Z*.sub.q according to a formula r.sub.0Z*.sub.q, wherein is the multi-proxy signature, wherein T.sub.MP=(T.sub.0, T.sub.1, . . . , T.sub.n), wherein T.sub.i is obtained through computation by a proxy signature device with a sequence number of i according to a formula T.sub.i=r.sub.iP, wherein r.sub.i is randomly selected by the proxy signature device with the sequence number of i from Z*.sub.q according to a formula r.sub.iZ*.sub.q, wherein V.sub.MP=.sub.i=0.sup.nV.sub.i, wherein V.sub.i is obtained through computation by the proxy signature device with the sequence number of i according to a formula V.sub.i=D.sub.i+x.sub.iH.sub.3(m,T.sub.i,P.sub.i)+r.sub.iH.sub.4(m,T.sub.i,P.sub.i), wherein i (1in) is a sequence number of the proxy signature device, wherein n is a quantity of proxy signature devices, and wherein the public parameter further comprises H.sub.3() and H.sub.4().
9. The certificateless multi-proxy signature method according to claim 8, wherein verifying the multi-proxy signature according to the public key of each proxy signature device comprises verifying the multi-proxy signature according to a formula V.sub.MPP=P.sub.pub.sub.i=0.sup.nH(ID.sub.i,P.sub.i)+.sub.i=1.sup.nP.sub.iH.sub.3(m,T.sub.i,P.sub.i)=.sub.i=1.sup.nT.sub.iH.sub.4(m,T.sub.i,P.sub.i)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0).
10. A certificateless multi-proxy signature apparatus, comprising a memory storing instructions, the instructions being executable by a processor to: acquire a multi-proxy signature after a standard signature verification device verifies that a standard signature is valid, wherein the standard signature comprises T and V, wherein T is obtained through computation by a standard signature computing device according to a formula T=rP, wherein V is obtained through computation by the standard signature computing device according to a formula V=D.sub.a+x.sub.aH.sub.1(m,T,P.sub.a)+rH.sub.2(m,T,P.sub.a), wherein the multi-proxy signature is obtained through computation by a proxy signature device administrator according to a partial proxy signature of each proxy signature device, and wherein the partial proxy signature is obtained through computation by the proxy signature device according to a private key of the proxy signature device; and verify the multi-proxy signature according to a public key of each proxy signature device, wherein r is randomly selected from Z*.sub.q according to a formula rZ*.sub.q, wherein a is a sequence number of the standard signature computing device, wherein 0al, wherein l is a quantity of standard signature computing devices plus one, wherein x.sub.a is a first sub-private key comprised in a private key of the standard signature computing device, wherein D.sub.a is a second sub-private key comprised in the private key of the standard signature computing device, wherein m is a message m input by a transmit end, wherein P.sub.a is a public key of the standard signature computing device, wherein the public parameter comprises H.sub.1(), H.sub.2(), and P, wherein P is a generator of G, and wherein G is a group G whose order is a prime number q.
11. The certificateless multi-proxy signature apparatus according to claim 10, wherein P.sub.a is obtained through computation by the standard signature computing device according to a formula P.sub.a=x.sub.aP, wherein x.sub.a is randomly selected by the standard signature computing device from Z*.sub.q according to a formula x.sub.aZ*.sub.q, wherein D.sub.a is obtained through computation by the standard signature computing device according to a formula D.sub.a=sH(ID.sub.a,P.sub.a), wherein ID.sub.a is an identifier of the standard signature computing device, wherein s is a master key, and wherein the public parameter comprises H() and q.
12. The certificateless multi-proxy signature apparatus according to claim 11, wherein the standard signature verification device verifies the standard signature according to a formula VP=P.sub.pubH(ID.sub.a,P.sub.a)+P.sub.aH.sub.1(m,T,P.sub.a)+TH.sub.2(m,T,P.sub.a), wherein the standard signature computing device is one of another signature device except an original signature device and the proxy signature device, and the original signature device, wherein the standard signature verification device is any one of: the proxy signature device; the original signature device; and the another signature device except the original signature device and the proxy signature device, wherein the standard signature verification device is different from the standard signature computing device, and wherein the public parameter further comprises P.sub.pub.
13. The certificateless multi-proxy signature apparatus according to claim 12, wherein acquiring the multi-proxy signature after the standard signature verification device verifies that the standard signature is valid comprises: determining whether the proxy signature device administrator verifies, according to the partial proxy signature of each proxy signature device, that both a formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0) and a formula V.sub.iP=P.sub.pubH(ID.sub.i,P.sub.i)+P.sub.iH.sub.3(m,T.sub.i,P.sub.i)+T.sub.iH.sub.4(m,T.sub.i,P.sub.i) hold; and computing the multi-proxy signature according to a formula =(,T.sub.MP,V.sub.MP) when the proxy signature device administrator verifies that both the formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0) and the formula V.sub.iP=P.sub.pubH(ID.sub.i,P.sub.i)+P.sub.iH.sub.3(m,T.sub.i,P.sub.i)+T.sub.iH.sub.4(m,T.sub.i,P.sub.i) hold, wherein V.sub.0 is obtained through computation by the original signature device according to a formula V.sub.0=D.sub.0+x.sub.0H.sub.1(,T.sub.0,P.sub.0)+r.sub.0H.sub.2(,T.sub.0, P.sub.0), wherein comprises identity information of the proxy signature device and identity information of the original signature device, wherein T.sub.0 is obtained through computation by the original signature device according to a formula T.sub.0=r.sub.0P, wherein r.sub.0 is randomly selected by the original signature device from Z*.sub.q according to a formula r.sub.0Z*.sub.q, wherein is the multi-proxy signature, wherein T.sub.MP is given by T.sub.MP=(T.sub.0, T.sub.1, . . . , T.sub.n), wherein T.sub.i is obtained through computation by a proxy signature device with a sequence number of i according to a formula T.sub.i=r.sub.iP, wherein r.sub.i is randomly selected by the proxy signature device with the sequence number of i from Z*.sub.q according to a formula r.sub.iZ*.sub.q, wherein V.sub.MP is given by V.sub.MP=.sub.i=0.sup.nV.sub.i, wherein V.sub.i is obtained through computation by the proxy signature device with the sequence number of i according to a formula V.sub.i=D.sub.i+x.sub.iH.sub.3(m,T.sub.i,P.sub.i)+r.sub.iH.sub.4(m,T.sub.i,P.sub.i), wherein i (1in) is a sequence number of the proxy signature device, wherein n is a quantity of proxy signature devices, and wherein the public parameter further comprises H.sub.3() and H.sub.4().
14. The certificateless multi-proxy signature apparatus according to claim 13, wherein verifying the multi-proxy signature according to the public key of each proxy signature device comprises verifying the multi-proxy signature according to a formula V.sub.MPP=P.sub.pub.sub.i=0.sup.nH(ID.sub.i,P.sub.i)+.sub.i=1.sup.nP.sub.iH.sub.3(m,T.sub.i,P.sub.i)+.sub.i=1.sup.nT.sub.iH.sub.4(m,T.sub.i,P.sub.i)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0).
Description
BRIEF DESCRIPTION OF DRAWINGS
(1) To describe the technical solutions in the embodiments of the present disclosure more clearly, the following briefly introduces the accompanying drawings required for describing the embodiments. The accompanying drawings in the following description show merely some embodiments of the present disclosure, and a person of ordinary skill in the art may still derive other drawings from these accompanying drawings without creative efforts.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
DESCRIPTION OF EMBODIMENTS
(10) The following clearly describes the technical solutions in the embodiments of the present disclosure with reference to the accompanying drawings in the embodiments of the present disclosure. The described embodiments are merely a part rather than all of the embodiments of the present disclosure. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present disclosure without creative efforts shall fall within the protection scope of the present disclosure.
(11) A certificateless multi-proxy signature scheme is operated based on bilinear pairings, and the bilinear pairings involve a large computing amount and consume longer time in implementing a signature operation compared with other mechanisms. Generally, a computation cost of bilinear pairings is approximately more than 20 times that of scalar multiplication over elliptic curve group.
(12) To resolve the foregoing problem, an embodiment provides a certificateless multi-proxy signature method, and the method is executed by a proxy signature device. As shown in
(13) The public key is corresponding to the private key.
(14) In an implementation manner of this embodiment, in a process of implementing certificateless multi-proxy signature, first, a system may publish a public parameter. The public parameter may be acquired by any signature device, so that each signature device computes its own public key and private key according to the public parameter.
(15) The any signature device in this embodiment may be any one of the following: another proxy signature device except the proxy signature device executing this step, an original signature device, and the like.
(16) The public key and the private key are not limited in this embodiment and are technologies well known to a person skilled in the art, which are not described herein again.
(17) 102. Acquire a verification result of a standard signature and determine, according to the verification result, whether the standard signature is valid.
(18) The standard signature includes T and V, where T is obtained through computation by a standard signature computing device according to a formula T=rP, and V is obtained through computation by the standard signature computing device according to a formula V=D.sub.a+x.sub.aH.sub.1(m,T,P.sub.a)+rH.sub.2(m,T,P.sub.a), where r is randomly selected from Z*.sub.q according to a formula rZ*.sub.q; a is a sequence number of the standard signature computing device and 0al, where l is a quantity of standard signature computing devices plus one; x.sub.a is a first sub-private key included in a private key of the standard signature computing device; D.sub.a is a second sub-private key included in the private key of the standard signature computing device; m is a message m input by a transmit end; P.sub.a is a public key of the standard signature computing device; and the public parameter includes H.sub.1(), H.sub.2(), and P, where P is a generator of G, and G is a group G whose order is a prime number q.
(19) In an implementation manner of this embodiment, a standard signature verification device may first acquire the standard signature from the standard signature computing device, and then the proxy signature device may acquire the verification result of the standard signature from the standard signature verification device, where the verification result may be used to represent whether the standard signature is valid.
(20) 103. The proxy signature device computes a partial proxy signature of the proxy signature device according to the private key if the verification result is used to represent that the standard signature is valid.
(21) In the process of implementing certificateless multi-proxy signature, the original signature device may authorize multiple proxy signature devices to perform multi-proxy signature. The multiple proxy signature devices may compute their partial proxy signatures according to their own private keys. A proxy signature device administrator may perform a corresponding operation on the partial proxy signatures of all the proxy signature devices to obtain a multi-proxy signature, and determine the multi-proxy signature as a signature of the original signature device.
(22) To execute the subsequent step, first, the proxy signature device may compute the partial proxy signature of the proxy signature device according to the private key.
(23) 104. The proxy signature device sends the partial proxy signature to a proxy signature device administrator, so that after the proxy signature device administrator obtains a multi-proxy signature through computation according to the partial proxy signature, a multi-proxy signature verification device verifies the multi-proxy signature.
(24) In an implementation manner of this embodiment, after the proxy signature device obtains its partial proxy signature through computation according to its own private key, the proxy signature device may send the partial proxy signature to the proxy signature device administrator. After receiving partial proxy signatures of all proxy signature devices, the proxy signature device administrator computes the multi-proxy signature according to the partial proxy signatures of all the proxy signature devices. The verification device may verify the multi-proxy signature.
(25) It should be noted that the proxy signature device administrator may be any proxy signature device.
(26) In this solution, a multi-proxy signature is computed according to a private key, and then the multi-proxy signature is verified according to a public key. Because computing time (which may include time for computing the public key and the private key) of the method in the present disclosure is less than time for computing bilinear pairings, compared with a multi-proxy signature based on the bilinear pairings, this solution decreases a computing amount, thereby reducing computing time.
(27) An embodiment provides another certificateless multi-proxy signature method, where the method may be executed by a multi-proxy signature verification device. As shown in
(28) The standard signature includes T and V, where T is obtained through computation by a standard signature computing device according to a formula T=rP, and V is obtained through computation by the standard signature computing device according to a formula V=D.sub.a+x.sub.aH.sub.1(m,T,P.sub.a)+rH.sub.2(m,T,P.sub.a); the multi-proxy signature is obtained through computation by a proxy signature device administrator according to a partial proxy signature of each proxy signature device; and the partial proxy signature is obtained through computation by the proxy signature device according to a private key of the proxy signature device, where r is randomly selected from Z*.sub.q according to a formula rZ*.sub.q; a is a sequence number of the standard signature computing device and 0al, where l is a quantity of standard signature computing devices plus one; x.sub.a is a first sub-private key included in a private key of the standard signature computing device; D.sub.a is a second sub-private key included in the private key of the standard signature computing device; m is a message m input by a transmit end; P.sub.a is a public key of the standard signature computing device; and the public parameter includes H.sub.1(), H.sub.2 (), and P, where P is a generator of G, and G is a group G whose order is a prime number q.
(29) The multi-proxy signature may be obtained through computation by the proxy signature device administrator according to the partial proxy signature of each proxy signature device.
(30) The partial proxy signature may be obtained through computation by a corresponding proxy signature device according to a private key of the proxy signature device, where the public key is corresponding to the private key.
(31) In an implementation manner of this embodiment, the multi-proxy signature may be mainly used to check whether a transmitted message is complete.
(32) For example, to ensure reliability of a message m (which may be input by an input end) received by a receive end, the message m may be encrypted, that is, a multi-proxy signature of the message m may be computed, and the multi-proxy signature is verified.
(33) 202. The multi-proxy signature verification device verifies the multi-proxy signature according to a public key of each proxy signature device.
(34) In an implementation manner of this embodiment, the verification device verifies the multi-proxy signature according to the public key of each proxy signature device. If a verification result is that the multi-proxy signature is valid, it indicates that the message m may be complete. If the verification result is that the multi-proxy signature is invalid, it indicates that the message m may be incomplete.
(35) In this solution, a multi-proxy signature is computed according to a private key, and then the multi-proxy signature is verified according to a public key. Because computing time (that is, time for computing the public key and the private key) of the method in the present disclosure is less than time for computing bilinear pairings, compared with a multi-proxy signature based on the bilinear pairings, this solution decreases a computing amount, thereby reducing computing time.
(36) An embodiment provides still another certificateless multi-proxy signature method, where the method further extends and optimizes the methods shown in
(37) In an implementation manner of this embodiment, a private key generator (PKG) selects a group G whose order is a prime number q and randomly selects sZ*.sub.q as a master key, to compute a corresponding system public key P.sub.pub=sP, where P is a generator of G. Moreover, the PKG may randomly select five different cryptographic hash functions H,H.sub.1,H.sub.2,H.sub.3,H.sub.4:{0,1}*.fwdarw.Z*.sub.q.
(38) The public parameter may include G, P, q, H(), H.sub.1(), H.sub.2(), H.sub.3(), H.sub.4(), and P.sub.pub, that is, params=(G,P,q,H,H.sub.1,H.sub.2,H.sub.3,H.sub.4,P.sub.pub).
(39) The public parameter in this embodiment may be acquired by any device (a device such as the proxy signature device or an original signature device).
(40) 302. Each proxy signature device computes its own public key and private key according to the public parameter.
(41) A signature device in this embodiment may include the proxy signature device, the original signature device, and another signature device except the proxy signature device and the original signature device.
(42) Further, the private key may include a first sub-private key and a second sub-private key.
(43) Further, that each proxy signature device computes its own public key and private key according to the public parameter includes randomly selecting, by the proxy signature device, x.sub.i from Z*.sub.q according to a formula x.sub.iZ*.sub.q; computing the public key according to a formula P.sub.i=x.sub.iP; and computing the second sub-private key according to a formula D.sub.i=sH(ID.sub.i,P.sub.i), where i (1in) is a sequence number of the proxy signature device, where n is a quantity of proxy signature devices; x.sub.i is the first sub-private key included in the private key of the proxy signature device; D.sub.i is the second sub-private key included in the private key of the proxy signature device; P.sub.i is the public key of the proxy signature device; ID.sub.i is an identifier of the proxy signature device; s is the master key; and the public parameter includes H() and q.
(44) For example, a proxy signature device with a sequence number of 1 (that is, i=1) may randomly select x.sub.1 from Z*.sub.q according to a formula x.sub.1Z*.sub.q, compute a public key according to a formula P.sub.1=x.sub.1P, and compute a second sub-private key according to a formula D.sub.i=sH(ID.sub.1,P.sub.1), where a private key of the proxy signature device with the sequence number of 1 may include (x.sub.1,D.sub.1). A public key and a private key of another proxy signature device may be computed by using a same method as the foregoing enumerated method, which is not described herein again.
(45) Further, that the original signature device computes its own public key and private key according to the public parameter may include randomly selecting, by the original signature device (which may be understood as i=0), x.sub.0 from Z*.sub.q according to a formula x.sub.0Z*.sub.q; computing the public key according to a formula P.sub.0=x.sub.0P; and computing the second sub-private key according to a formula D.sub.0=sH(ID.sub.0,P.sub.0), where P.sub.0 is a public key of the original signature device, x.sub.0 is a first sub-private key of the original signature device, D.sub.0 is a second sub-private key of the original signature device, and ID.sub.0 is an identifier of the original signature device.
(46) It should be noted that, multiple signature devices (which may include the original signature device and the proxy signature device) may simultaneously execute this step, that is, multiple signature devices simultaneously compute their respective public keys and private keys.
(47) 303. A standard signature computing device computes a standard signature of a message m according to a private key of the standard signature computing device.
(48) The standard signature may include T and V.
(49) The standard signature computing device may compute T according to a formula T=rP, and may compute V according to a formula V=D.sub.a+x.sub.aH.sub.1(m,T,P.sub.a)+rH.sub.2(m,T,P.sub.a).
(50) Further, P.sub.a may be obtained through computation by the standard signature computing device according to a formula P.sub.a=x.sub.aP, where x.sub.a is randomly selected by the standard signature computing device from Z*.sub.q according to a formula x.sub.aZ*.sub.q, and D.sub.a is obtained through computation by the standard signature computing device according to a formula D.sub.a=sH(ID.sub.a,P.sub.a); where ID.sub.a is an identifier of the standard signature computing device, s is the master key, and the public parameter includes H() and q.
(51) Further, the standard signature computing device is any one of the proxy signature device, the original signature device, and the another signature device except the original signature device and the proxy signature device; where r is randomly selected from Z*.sub.q according to a formula rZ*.sub.q; a is a sequence number of the standard signature computing device and 0al, where l is a quantity of standard signature computing devices plus one; x.sub.a is a first sub-private key included in the private key of the standard signature computing device; D.sub.a is a second sub-private key included in the private key of the standard signature computing device; m is a message m input by a transmit end; P.sub.a is a public key of the standard signature computing device; and the public parameter includes H.sub.1(), H.sub.2(), and P, where P is a generator of G, and G is a group G whose order is a prime number q.
(52) If the standard signature computing device is the proxy signature device, that a proxy signature device with a sequence number of i computes the standard signature may include acquiring, by the proxy signature device with the sequence number of i, the message m input by the transmit end; randomly selecting r from Z*.sub.q according to a formula rZ*.sub.q; computing T according to a formula T=rP; and computing V according to a formula V=D.sub.i+x.sub.iH.sub.1(m,T,P.sub.i)+rH.sub.2(m,T,P.sub.i), so that the verification device checks whether the standard signature of the message m is valid, where the standard signature may include V and T.
(53) If the standard signature computing device is the original signature device, that the original signature device computes the standard signature may include acquiring, by the original signature device, the message m input by the transmit end; randomly selecting r from Z*.sub.q according to a formula rZ*.sub.q; computing T according to a formula T=rP; and computing V according to a formula V=D.sub.0+x.sub.0H.sub.1(m,T,P.sub.0)+rH.sub.2(m,T,P.sub.0), so that the verification device checks whether the standard signature of the message m is valid, where the standard signature may include V and T.
(54) If the standard signature computing device is the another signature device except the original signature device and the proxy signature device, that the another signature device computes the standard signature may include acquiring, by the another signature device, the message m input by the transmit end; randomly selecting r from Z*.sub.q according to a formula rZ*.sub.q; computing T according to a formula T=rP; and computing V according to a formula V=D.sub.b+x.sub.bH.sub.1(m,T,P.sub.b)+rH.sub.2(m,T,P.sub.b), so that the verification device checks whether the standard signature of the message m is valid, where the standard signature may include V and T, where b is a sequence number of the another signature device.
(55) It should be noted that, the standard signature computing device in this embodiment may be a signature device randomly selected from the proxy signature device, the original signature device, and the another signature device except the original signature device and the proxy signature device, and a specific selecting method may be set according to an actual need, which is not described herein again.
(56) 304. A standard signature verification device acquires the standard signature, obtained by the standard signature computing device through computation, of the message m.
(57) 305. The standard signature verification device checks whether the acquired standard signature is valid, so as to obtain a verification result. If it is verified that the standard signature is valid, execute step 306; if it is verified that the standard signature is invalid, end the procedure.
(58) Further, the standard signature verification device may verify the standard signature according to a formula VP=P.sub.pubH(ID.sub.a,P.sub.a)+P.sub.aH.sub.1(m,T,P.sub.a)+TH.sub.2(m,T,P.sub.a). If the equation holds, the standard signature may be valid; if the equation does not hold, the standard signature may be invalid, where ID.sub.a is an identifier of the standard signature computing device, and the public parameter further includes P.sub.pub.
(59) Further, the standard signature verification device may be any one of the proxy signature device, the original signature device, and the another signature device except the original signature device and the proxy signature device.
(60) If the standard signature verification device is any proxy signature device, the checking whether the acquired standard signature is valid may include verifying the standard signature according to a formula VP=P.sub.pubH(ID.sub.i,P.sub.i)+P.sub.iH.sub.1(m,T,P.sub.i)+TH.sub.2(m,T,P.sub.i), so that the proxy signature device computes a partial proxy signature according to the private key after it is verified that the standard signature is valid.
(61) If the formula VP=P.sub.pubH(ID.sub.i,P.sub.i)+P.sub.iH.sub.1(m,T,P.sub.i)+TH.sub.2(m,T,P.sub.i) holds, it indicates that the standard signature may be valid; if the formula VP=P.sub.pubH(ID.sub.i,P.sub.i)+P.sub.iH.sub.1(m,T,P.sub.i)+TH.sub.2(m,T,P.sub.i) does not hold, it indicates that the standard signature may be invalid.
(62) If the standard signature verification device is the original signature device, the checking whether the acquired standard signature is valid may include verifying the standard signature according to a formula VP=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(m,T,P.sub.0)+TH.sub.2(m,T,P.sub.0), so that the proxy signature device computes a partial proxy signature according to the private key after it is verified that the standard signature is valid.
(63) If the formula VP=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(m,T,P.sub.0)+TH.sub.2(m,T,P.sub.0) holds, it indicates that the standard signature may be valid; if the formula VP=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(m,T,P.sub.0)+TH.sub.2(m,T,P.sub.0) does not hold, it indicates that the standard signature may be invalid.
(64) If the standard signature verification device is any other signature device except the proxy signature device and the original signature device, the checking whether the acquired standard signature is valid may include verifying the standard signature according to a formula VP=P.sub.pubH(ID.sub.b,P.sub.b)+P.sub.bH.sub.1(m,T,P.sub.b)+TH.sub.2(m,T,P.sub.b), so that the proxy signature device computes a partial proxy signature according to the private key after it is verified that the standard signature is valid.
(65) If the formula VP=P.sub.pubH(ID.sub.b,P.sub.b)+P.sub.bH.sub.1(m,T,P.sub.b)+TH.sub.2(m,T,P.sub.b) holds, it indicates that the standard signature may be valid; if the formula VP=P.sub.pubH(ID.sub.b,P.sub.b)+P.sub.bH.sub.1(m,T,P.sub.b)+TH.sub.2(m,T,P.sub.b) does not hold, it indicates that the standard signature may be invalid.
(66) Further, the standard signature verification device is different from the standard signature computing device.
(67) 306. An original signature device computes an authorization signature according to a private key of the original signature device.
(68) In certificateless multi-proxy signature, the original signature device may authorize another proxy signature device to perform signature. In this step, the original signature device mainly performs authorization on the proxy signature device. The original signature device may first compute, according to the private key of the original signature device, an authorization signature of each proxy signature device. If each proxy signature device verifies that a corresponding authorization signature is valid, it indicates that the proxy signature device is authorized to perform multi-proxy signature.
(69) The authorization signature may include , T.sub.0, and V.sub.0.
(70) Further, the original signature device may compute V.sub.0 according to a formula V.sub.0=D.sub.0+x.sub.0H.sub.1(,T.sub.0,P.sub.0)+r.sub.0H.sub.2(,T.sub.0,P.sub.0), and compute T.sub.0 according to a formula T.sub.0=r.sub.0P, where may include but is not limited to identity information of a proxy signature device to be authorized, identity information of the original signature device, an authorization message type, an authorization period, and the like.
(71) 307. The proxy signature device acquires the authorization signature computed by the original signature device.
(72) 308. The proxy signature device verifies the authorization signature. If it is verified that the authorization signature is valid, execute step 309; if it is verified that the authorization signature is invalid, end the procedure or request a valid authorization signature from the original signature device.
(73) Further, that the proxy signature device verifies the authorization signature may include verifying, by the proxy signature device, the authorization signature according to a formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0).
(74) If the formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0) holds, it indicates that the authorization signature may be valid; if the formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0) does not hold, it indicates that the authorization signature may be invalid.
(75) Further, the proxy signature device may acquire a multi-proxy key, where the multi-proxy key may include P.sub.i, T.sub.0, and V.sub.0, that is, (x.sub.i,D.sub.i), T.sub.0, and V.sub.0.
(76) 309. The proxy signature device acquires the verification result of the standard signature from the standard signature verification device, and determines, according to the verification result, whether the standard signature is valid. If it is verified that the standard signature is valid, execute step 310; if it is verified that the standard signature is invalid, end the procedure.
(77) 310. The proxy signature device computes a partial proxy signature of the proxy signature device according to the private key.
(78) In an implementation manner of this embodiment, that the proxy signature device computes a partial proxy signature of the proxy signature device according to the private key may be that each proxy signature device computes its partial proxy signature according to the multi-proxy key.
(79) Further, that the proxy signature device with the sequence number of i computes a partial proxy signature may include randomly selecting, by the proxy signature device with the sequence number of i, r.sub.i from Z*.sub.q according to a formula r.sub.iZ*.sub.q; computing T.sub.i according to a formula T.sub.i=r.sub.iP; computing V.sub.i according to a formula V.sub.i=D.sub.i+x.sub.iH.sub.3(m,T.sub.i,P.sub.i)+r.sub.iH.sub.4(m,T.sub.i,P.sub.i), where the partial proxy signature may include , T.sub.0, V.sub.0, T.sub.i, and V.sub.i.
(80) For example, a proxy signature device with a sequence number of 1 (that is, i=1) randomly selects r.sub.1 from Z*.sub.q according to a formula r.sub.1Z*.sub.q, computes T.sub.1 according to a formula T.sub.1=r.sub.1P, and computes V.sub.1 according to a formula V.sub.1=D.sub.1+x.sub.1H.sub.3(m,T.sub.1,P.sub.1)+r.sub.1H.sub.4(m,T.sub.1,P.sub.1), where a partial proxy signature may include , T.sub.0, V.sub.0, T.sub.1, and V.sub.1. Another proxy signature device computes its own partial proxy signature according to the private key by using a same method as the foregoing enumerated method, which is described in this step.
(81) It should be noted that, in this step, multiple proxy signature devices may simultaneously compute their respective partial proxy signatures.
(82) 311. The proxy signature device sends the partial proxy signature to a proxy signature device administrator.
(83) It should be noted that, in this step, all the multiple proxy signature devices may send their respective partial proxy signatures to the proxy signature device administrator.
(84) 312. The proxy signature device administrator performs verification according to the received partial proxy signature and determines whether it is verified that the partial proxy signature is valid; if it is verified that the partial proxy signature is valid, step 313 is executed; if it is verified that the partial proxy signature is invalid, the procedure ends.
(85) Further, the proxy signature device administrator verifies the formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2 (,T.sub.0,P.sub.0) and a formula V.sub.iP=P.sub.pubH(ID.sub.i,P.sub.i)+P.sub.iH.sub.3(m,T.sub.i,P.sub.i)+T.sub.iH.sub.4(m,T.sub.i,P.sub.i) according to the received partial proxy signature.
(86) If all formulas included in the formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0) and the formula V.sub.iP=P.sub.pubH(ID.sub.i,P.sub.i)+P.sub.iH.sub.3(m,T.sub.i,P.sub.i)+T.sub.iH.sub.4(m,T.sub.i,P.sub.i) hold, it indicates that the partial proxy signature may be valid through verification; if all formulas included in the formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0) and the formula V.sub.iP=P.sub.pubH(ID.sub.i,P.sub.i)+P.sub.iH.sub.3(m,T.sub.i,P.sub.i)+T.sub.iH.sub.4(m,T.sub.i,P.sub.i) hold, it indicates that the partial proxy signature may be invalid through verification.
(87) 313. The proxy signature device administrator computes a multi-proxy signature according to the received partial proxy signature.
(88) Further, the proxy signature device administrator may compute the multi-proxy signature according to a formula =(,T.sub.MP,V.sub.MP), where is the multi-proxy signature, T.sub.MP=(T.sub.0, T.sub.1, . . . , T.sub.n), and V.sub.MP=.sub.i=0.sup.nV.sub.i.
(89) 314. The verification device verifies the multi-proxy signature.
(90) Further, the verification device may verify the multi-proxy signature according to a formula V.sub.MPP=P.sub.pub.sub.i=0.sup.nH(ID.sub.i,P.sub.i)+.sub.i=1.sup.nP.sub.iH.sub.3(m,T.sub.i,P.sub.i)+.sub.i=1.sup.nT.sub.iH.sub.4(m,T.sub.i,P.sub.i)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0).
(91) If the formula V.sub.MPP=P.sub.pub.sub.i=0.sup.nH(ID.sub.i,P.sub.i)+.sub.i=1.sup.nP.sub.iH.sub.3(m,T.sub.i,P.sub.i)+.sub.i=1.sup.nT.sub.iH.sub.4(m,T.sub.i,P.sub.i)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0) holds, it indicates that the multi-proxy signature may be valid; if the formula V.sub.MPP=P.sub.pub.sub.i=0.sup.nH(ID.sub.i,P.sub.i)+.sub.i=1.sup.nP.sub.iH.sub.3(m,T.sub.i,P.sub.i)+.sub.i=1.sup.nT.sub.iH.sub.4(m,T.sub.i,P.sub.i)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0) does not hold, it indicates that the multi-proxy signature may be invalid.
(92) In this solution, a multi-proxy signature is computed according to a private key, and then the multi-proxy signature is verified according to a public key. Because computing time (which may include time for computing the public key and the private key) of the method in the present disclosure is less than time for computing bilinear pairings, compared with a multi-proxy signature based on the bilinear pairings, this solution decreases a computing amount, thereby reducing computing time. In addition, no certificate is introduced in computing the public key, ensuring that no certificate is disclosed. Computing the private key according to the public key can enable the public key and the private key to restrict each other and avoid a public key replacement attack.
(93) The following provides some virtual apparatus embodiments, and these virtual apparatus embodiments are respectively corresponding to the method embodiments provided above.
(94) An embodiment provides a certificateless multi-proxy signature apparatus. As shown in
(95) In this solution, a multi-proxy signature is computed according to a private key, and then the multi-proxy signature is verified according to a public key. Because computing time (which may include time for computing the public key and the private key) of the method in the present disclosure is less than time for computing bilinear pairings, compared with a multi-proxy signature based on the bilinear pairings, this solution decreases a computing amount, thereby reducing computing time.
(96) An embodiment provides another certificateless multi-proxy signature apparatus, and the apparatus further extends and optimizes the apparatus shown in
(97) Further, the standard signature computing device is any one of the proxy signature device, an original signature device, and another signature device except the original signature device and the proxy signature device.
(98) The verification result is obtained after a standard signature verification device verifies the standard signature according to a formula VP=P.sub.pubH(ID.sub.a,P.sub.a)+P.sub.aH.sub.1(m,T,P.sub.a)+TH.sub.2(m,T,P.sub.a), where the standard signature verification device is any one of the proxy signature device, the original signature device, and the another signature device except the original signature device and the proxy signature device, and the standard signature verification device is different from the standard signature computing device; where ID.sub.a is an identifier of the standard signature computing device, and the public parameter further includes P.sub.pub.
(99) Further, the first computing unit 51 includes a first selecting module 511 configured to randomly select x.sub.i from Z*.sub.q according to a formula x.sub.iZ*.sub.q, a first computing module 512 configured to compute the public key according to a formula, P.sub.i=x.sub.iP, and a second computing module 513 configured to compute a second sub-private key according to a formula D.sub.i=sH(ID.sub.i,P.sub.i); where i (1in) is a sequence number of the proxy signature device, where n is a quantity of proxy signature devices; x.sub.i is a first sub-private key included in the private key of the proxy signature device; D.sub.i is the second sub-private key included in the private key of the proxy signature device; P.sub.i is the public key of the proxy signature device; ID.sub.i is an identifier of the proxy signature device; s is a master key; and the public parameter includes H() and q.
(100) Further, the second computing unit 53 includes an acquiring module 531 configured to acquire an authorization signature computed by the original signature device, where the authorization signature includes , T.sub.0, and V.sub.0, an authorization signature verification module 532 configured to verify the authorization signature according to a formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0), a second selecting module 533 configured to randomly select r.sub.i from Z*.sub.q according to a formula r.sub.iZ*.sub.q if it is verified that the authorization signature is valid, a third computing module 534 configured to compute T.sub.i according to a formula T.sub.i=r.sub.iP, and a fourth computing module 535 configured to compute V.sub.i according to a formula V.sub.i=D.sub.i+x.sub.iH.sub.3(m,T.sub.i,P.sub.i)+r.sub.iH.sub.4(m,T.sub.i,P.sub.i), where the partial proxy signature includes , T.sub.0, V.sub.0, T.sub.i, and V.sub.i; where includes identity information of the proxy signature device and identity information of the original signature device; T.sub.0 is obtained through computation by the original signature device according to a formula T.sub.0=r.sub.0P, where r.sub.0 is randomly selected by the original signature device from Z*.sub.q according to a formula r.sub.0Z*.sub.q; V.sub.0 is obtained through computation by the original signature device according to a formula V.sub.0=D.sub.0+x.sub.0H.sub.1(,T.sub.0,P.sub.0)+r.sub.0H.sub.2(,T.sub.0,P.sub.0); x.sub.0(Z*.sub.q) is a first sub-private key of the original signature device; D.sub.0(=sH(ID.sub.0,P.sub.0)) is a second sub-private key of the original signature device; ID.sub.0 is an identifier of the original signature device; P.sub.0(=x.sub.0P) is a public key of the original signature device; m is a message m input by an input end; and the public parameter further includes H.sub.3(), H.sub.4(), and P.sub.pub.
(101) In this solution, a multi-proxy signature is computed according to a private key, and then the multi-proxy signature is verified according to a public key. Because computing time (which may include time for computing the public key and the private key) of the method in the present disclosure is less than time for computing bilinear pairings, compared with a multi-proxy signature based on the bilinear pairings, this solution decreases a computing amount, thereby reducing computing time. In addition, no certificate is introduced in computing the public key, ensuring that no certificate is disclosed. Computing the private key according to the public key can enable the public key and the private key to restrict each other and avoid a public key replacement attack.
(102) An embodiment provides another certificateless multi-proxy signature apparatus. As shown in
(103) In this solution, a multi-proxy signature is computed according to a private key, and then the multi-proxy signature is verified according to a public key. Because computing time (which may include time for computing the public key and the private key) of the method in the present disclosure is less than time for computing bilinear pairings, compared with a multi-proxy signature based on the bilinear pairings, this solution decreases a computing amount, thereby reducing computing time.
(104) An embodiment provides another certificateless multi-proxy signature apparatus, and the apparatus further extends and optimizes the apparatus shown in
(105) Further, P.sub.a is obtained through computation by the standard signature computing device according to a formula P.sub.a=x.sub.aP, where x.sub.a is randomly selected by the standard signature computing device from Z*.sub.q according to a formula x.sub.aZ*.sub.q, and D.sub.a is obtained through computation by the standard signature computing device according to a formula D.sub.a=sH(ID.sub.a,P.sub.a); where ID.sub.a is an identifier of the standard signature computing device, s is a master key, and the public parameter includes H() and q.
(106) Further, the standard signature verification device verifies the standard signature according to a formula VP=P.sub.pubH(ID.sub.a,P.sub.a)+P.sub.aH.sub.1(m,T,P.sub.a)+TH.sub.2(m,T,P.sub.a); the standard signature computing device is either of another signature device except an original signature device and the proxy signature device, and the original signature device; the standard signature verification device is any one of the proxy signature device, the original signature device, and the another signature device except the original signature device and the proxy signature device; and the standard signature verification device is different from the standard signature computing device.
(107) The public parameter further includes P.sub.pub.
(108) Further, the acquiring unit 71 includes a determining module 711 configured to determine whether the proxy signature device administrator verifies, according to the partial proxy signature of each proxy signature device, that both of a formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0) and a formula V.sub.iP=P.sub.pubH(ID.sub.i,P.sub.i)+P.sub.iH.sub.3(m,T.sub.i,P.sub.i)+T.sub.iH.sub.4(m,T.sub.i,P.sub.i) hold, and a computing module 712 configured to, if yes, compute the multi-proxy signature according to a formula =(,T.sub.MP,V.sub.MP); where V.sub.0 is obtained through computation by the original signature device according to a formula V.sub.0=D.sub.0+x.sub.0H.sub.1(,T.sub.0,P.sub.0)+r.sub.0H.sub.2(,T.sub.0,P.sub.0), includes identity information of the proxy signature device and identity information of the original signature device, T.sub.0 is obtained through computation by the original signature device according to a formula T.sub.0=r.sub.0P, and r.sub.0 is randomly selected by the original signature device from Z*.sub.q according to a formula r.sub.0Z*.sub.q. is the multi-proxy signature; T.sub.MP=(T.sub.0, T.sub.1, . . . , T.sub.n), where T.sub.i is obtained through computation by a proxy signature device with a sequence number of i according to a formula T.sub.i=r.sub.iP, where r.sub.i is randomly selected by the proxy signature device with the sequence number of i from Z*.sub.q according to a formula r.sub.iZ*.sub.q; V.sub.MP=.sub.i=0.sup.nV.sub.i, where V.sub.i is obtained through computation by the proxy signature device with the sequence number of i according to a formula V.sub.i=D.sub.i+x.sub.iH.sub.3(m,T.sub.i,P.sub.i)+r.sub.iH.sub.4(m,T.sub.i,P.sub.i), i (1in) is a sequence number of the proxy signature device, and n is a quantity of proxy signature devices; and the public parameter further includes H.sub.3() and H.sub.4().
(109) Further, the verification unit 72 includes a verification module 721 configured to verify the multi-proxy signature according to a formula V.sub.MPP=P.sub.pub.sub.i=0.sup.nH(ID.sub.i,P.sub.i)+.sub.i=1.sup.nP.sub.iH.sub.3(m,T.sub.i,P.sub.i)+.sub.i=1.sup.nT.sub.iH.sub.4(m,T.sub.i,P.sub.i)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0).
(110) In this solution, a multi-proxy signature is computed according to a private key, and then the multi-proxy signature is verified according to a public key. Because computing time (which may include time for computing the public key and the private key) of the method in the present disclosure is less than time for computing bilinear pairings, compared with a multi-proxy signature based on the bilinear pairings, this solution decreases a computing amount, thereby reducing computing time. In addition, no certificate is introduced in computing the public key, ensuring that no certificate is disclosed. Computing the private key according to the public key can enable the public key and the private key to restrict each other and avoid a public key replacement attack.
(111) The following provides some physical apparatus embodiments, and these physical apparatus embodiments are respectively corresponding to the method embodiments and the virtual apparatus embodiments that are provided above.
(112) An embodiment provides a device, and this device may be a terminal or a network side device such as a computer, a mobile phone, a tablet computer, or a server, and is used to implement the method shown in any one of
(113) In some implementation manners, the memory 18 stores the following elements: an executable module or a data structure, or a subset thereof, or an extended set thereof.
(114) An operating system 180 includes various system programs and is configured to implement various basic services and process hardware-based tasks.
(115) An application program module 181 includes various application programs and is configured to implement various application services.
(116) The application program module 181 may include but is not limited to a first computing unit configured to compute a public key and a private key of a proxy signature device according to a public parameter, where the public key is corresponding to the private key, an acquiring unit configured to acquire a verification result of a standard signature, and determine, according to the verification result, whether the standard signature is valid, where the standard signature includes T and V, where T is obtained through computation by a standard signature computing device according to a formula T=rP, and V is obtained through computation by the standard signature computing device according to a formula V=D.sub.a+x.sub.aH.sub.1(m,T,P.sub.a)+rH.sub.2(m,T,P.sub.a), a second computing unit configured to compute a partial proxy signature of the proxy signature device according to the private key if the verification result is used to represent that the standard signature is valid, and a sending unit configured to send the partial proxy signature to a proxy signature device administrator, so that after the proxy signature device administrator obtains a multi-proxy signature through computation according to the partial proxy signature, a multi-proxy signature verification device verifies the multi-proxy signature, where r is randomly selected from Z*.sub.q according to a formula rZ*.sub.q; a is a sequence number of the standard signature computing device and 0al, where l is a quantity of standard signature computing devices plus one; x.sub.a is a first sub-private key included in a private key of the standard signature computing device; D.sub.a is a second sub-private key included in the private key of the standard signature computing device; m is a message m input by a transmit end; P.sub.a is a public key of the standard signature computing device; and the public parameter includes H.sub.1(), H.sub.2(), and P, where P is a generator of G, and G is a group G whose order is a prime number q.
(117) Further, the standard signature computing device is any one of the proxy signature device, an original signature device, and another signature device except the original signature device and the proxy signature device.
(118) The verification result is obtained after a standard signature verification device verifies the standard signature according to a formula VP=P.sub.pubH(ID.sub.a,P.sub.a)+P.sub.aH.sub.1(m,T,P.sub.a)+TH.sub.2(m,T,P.sub.a), where the standard signature verification device is any one of the proxy signature device, the original signature device, and the another signature device except the original signature device and the proxy signature device, and the standard signature verification device is different from the standard signature computing device; where ID.sub.a is an identifier of the standard signature computing device, and the public parameter further includes P.sub.pub.
(119) Further, the first computing unit includes a first selecting module configured to randomly select x.sub.i from Z*.sub.q according to a formula x.sub.iZ*.sub.q, a first computing module configured to compute the public key according to a formula P.sub.i=x.sub.iP, and a second computing module configured to compute a second sub-private key according to a formula D.sub.i=sH(ID.sub.i,P.sub.i); where i (1in) is a sequence number of the proxy signature device, where n is a quantity of proxy signature devices; x.sub.i is a first sub-private key included in the private key of the proxy signature device; D.sub.i is the second sub-private key included in the private key of the proxy signature device; P.sub.i is the public key of the proxy signature device; ID.sub.i is an identifier of the proxy signature device; s is a master key; and the public parameter includes H() and q.
(120) Further, the second computing unit includes an acquiring module configured to acquire an authorization signature computed by the original signature device, where the authorization signature includes , T.sub.0, and V.sub.0, an authorization signature verification module configured to verify the authorization signature according to a formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0), a second selecting module configured to randomly select r.sub.i from Z*.sub.q according to a formula r.sub.iZ*.sub.q if it is verified that the authorization signature is valid, a third computing module configured to compute T.sub.i according to a formula T.sub.i=r.sub.iP, and a fourth computing module configured to compute V.sub.i according to a formula V.sub.i=D.sub.i+x.sub.iH.sub.3(m,T.sub.i,P.sub.i)+r.sub.iH.sub.4(m,T.sub.i,P.sub.i), where the partial proxy signature includes , T.sub.0, V.sub.0, T.sub.i, and V.sub.i; where includes identity information of the proxy signature device and identity information of the original signature device; T.sub.0 is obtained through computation by the original signature device according to a formula T.sub.0=r.sub.0P, where r.sub.0 is randomly selected by the original signature device from Z*.sub.q according to a formula r.sub.0Z*.sub.q; V.sub.0 is obtained through computation by the original signature device according to a formula V.sub.0=D.sub.0+x.sub.0H.sub.1(,T.sub.0,P.sub.0)+r.sub.0H.sub.2(,T.sub.0,P.sub.0); x.sub.0(Z*.sub.q) is a first sub-private key of the original signature device; D.sub.0(=sH(ID.sub.0,P.sub.0)) is a second sub-private key of the original signature device; ID.sub.0 is an identifier of the original signature device; P.sub.0(=x.sub.0P) is a public key of the original signature device; m is a message m input by an input end; and the public parameter further includes H.sub.3(), H.sub.4(), and P.sub.pub.
(121) The application program module 181 may further include but is not limited to an acquiring unit configured to acquire a multi-proxy signature after a standard signature verification device verifies that a standard signature is valid, where the standard signature includes T and V, where T is obtained through computation by a standard signature computing device according to a formula T=rP, and V is obtained through computation by the standard signature computing device according to a formula V=D.sub.a+x.sub.aH.sub.1(m,T,P.sub.a)+rH.sub.2(m,T,P.sub.a); the multi-proxy signature is obtained through computation by a proxy signature device administrator according to a partial proxy signature of each proxy signature device; and the partial proxy signature is obtained through computation by the proxy signature device according to a private key of the proxy signature device, and a verification unit configured to verify the multi-proxy signature according to a public key of each proxy signature device; where r is randomly selected from Z*.sub.q according to a formula rZ*.sub.q; a is a sequence number of the standard signature computing device and 0al, where l is a quantity of standard signature computing devices plus one; x.sub.a is a first sub-private key included in a private key of the standard signature computing device; D.sub.a is a second sub-private key included in the private key of the standard signature computing device; m is a message m input by a transmit end; P.sub.a is a public key of the standard signature computing device; and the public parameter includes H.sub.1(), H.sub.2(), and P, where P is a generator of G, and G is a group G whose order is a prime number q.
(122) Further, P.sub.a is obtained through computation by the standard signature computing device according to a formula P.sub.a=x.sub.aP, where x.sub.a is randomly selected by the standard signature computing device from Z*.sub.q according to a formula x.sub.aZ*.sub.q, and D.sub.a is obtained through computation by the standard signature computing device according to a formula D.sub.a=sH(ID.sub.a,P.sub.a); where ID.sub.a is an identifier of the standard signature computing device, s is a master key, and the public parameter includes H() and q.
(123) Further, the standard signature verification device verifies the standard signature according to a formula VP=P.sub.pubH(ID.sub.a,P.sub.a)+P.sub.aH.sub.1(m,T,P.sub.a)+TH.sub.2(m,T,P.sub.a); the standard signature computing device is either of another signature device except an original signature device and the proxy signature device, and the original signature device; the standard signature verification device is any one of the proxy signature device, the original signature device, and the another signature device except the original signature device and the proxy signature device; and the standard signature verification device is different from the standard signature computing device.
(124) The public parameter further includes P.sub.pub.
(125) Further, the acquiring unit includes a determining module configured to determine whether the proxy signature device administrator verifies, according to the partial proxy signature of each proxy signature device, that both of a formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0) and a formula V.sub.iP=P.sub.pub H(ID.sub.i,P.sub.i)+P.sub.iH.sub.3(m,T.sub.i,P.sub.i)+T.sub.iH.sub.4(m,T.sub.i,P.sub.i) hold, and a computing module configured to, if yes, compute the multi-proxy signature according to a formula =(,T.sub.MP,V.sub.MP); where V.sub.0 is obtained through computation by the original signature device according to a formula V.sub.0=D.sub.0+x.sub.0H.sub.1(,T.sub.0,P.sub.0)+r.sub.0H.sub.2(,T.sub.0,P.sub.0), includes identity information of the proxy signature device and identity information of the original signature device, T.sub.0 is obtained through computation by the original signature device according to a formula T.sub.0=r.sub.0P, and r.sub.0 is randomly selected by the original signature device from Z*.sub.q according to a formula r.sub.0Z*.sub.q; is the multi-proxy signature; T.sub.MP=(T.sub.0, T.sub.1, . . . , T.sub.n) where T.sub.i is obtained through computation by a proxy signature device with a sequence number of i according to a formula T.sub.i=r.sub.iP, where r.sub.i is randomly selected by the proxy signature device with the sequence number of i from Z*.sub.q according to a formula r.sub.iZ*.sub.q; V.sub.MP=.sub.i=0.sup.nV.sub.i, where V.sub.i is obtained through computation by the proxy signature device with the sequence number of i according to a formula V.sub.i=D.sub.i+x.sub.iH.sub.3(m,T.sub.i,P.sub.i)+r.sub.iH.sub.4(m,T.sub.i,P.sub.i), i (1in) is a sequence number of the proxy signature device, and n is a quantity of proxy signature devices; and the public parameter further includes H.sub.3() and H.sub.4().
(126) Further, the verification unit includes a verification module configured to verify the multi-proxy signature according to a formula V.sub.MPP=P.sub.pub.sub.i=0.sup.nH(ID.sub.i,P.sub.i)+.sub.i=1.sup.nP.sub.iH.sub.3(m,T.sub.i,P.sub.i)+.sub.i=1.sup.nT.sub.iH.sub.4(m,T.sub.i,P.sub.i)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0).
(127) In this embodiment of the present disclosure, by invoking programs or instructions stored in the memory 18, the processor 15 is configured to compute a public key and a private key of a proxy signature device according to a public parameter, where the public key is corresponding to the private key, acquire a verification result of a standard signature, and determine, according to the verification result, whether the standard signature is valid, where the standard signature includes T and V, where T is obtained through computation by a standard signature computing device according to a formula T=rP, and V is obtained through computation by the standard signature computing device according to a formula V=D.sub.a+x.sub.aH.sub.1(m,T,P.sub.a)+rH.sub.2(m,T,P.sub.a), compute a partial proxy signature of the proxy signature device according to the private key if the verification result is used to represent that the standard signature is valid, and send the partial proxy signature to a proxy signature device administrator, so that after the proxy signature device administrator obtains a multi-proxy signature through computation according to the partial proxy signature, a multi-proxy signature verification device verifies the multi-proxy signature, where r is randomly selected from Z*.sub.q according to a formula rZ*.sub.q; a is a sequence number of the standard signature computing device and 0al, where l is a quantity of standard signature computing devices plus one; x.sub.a is a first sub-private key included in a private key of the standard signature computing device; D.sub.a is a second sub-private key included in the private key of the standard signature computing device; m is a message m input by a transmit end; P.sub.a is a public key of the standard signature computing device; and the public parameter includes H.sub.1(), H.sub.2(), and P, where P is a generator of G, and G is a group G whose order is a prime number q.
(128) Further, the standard signature computing device is any one of the proxy signature device, an original signature device, and another signature device except the original signature device and the proxy signature device.
(129) The verification result is obtained after a standard signature verification device verifies the standard signature according to a formula VP=P.sub.pubH(ID.sub.a,P.sub.a)+P.sub.aH.sub.1(m,T,P.sub.a)+TH.sub.2(m,T,P.sub.a), where the standard signature verification device is any one of the proxy signature device, the original signature device, and the another signature device except the original signature device and the proxy signature device, and the standard signature verification device is different from the standard signature computing device; where ID.sub.a is an identifier of the standard signature computing device, and the public parameter further includes P.sub.pub.
(130) Further, the processor 15 is configured to: randomly select x.sub.i from Z*.sub.q according to a formula x.sub.iZ*.sub.q, compute the public key according to a formula P.sub.i=x.sub.iP, and compute a second sub-private key according to a formula D.sub.i=sH(ID.sub.i,P.sub.i); where i (1in) is a sequence number of the proxy signature device, where n is a quantity of proxy signature devices; x.sub.i is a first sub-private key included in the private key of the proxy signature device; D.sub.i is the second sub-private key included in the private key of the proxy signature device; P.sub.i is the public key of the proxy signature device; ID.sub.i is an identifier of the proxy signature device; s is a master key; and the public parameter includes H() and q.
(131) Further, the computing a partial proxy signature according to the private key includes acquiring an authorization signature computed by the original signature device, where the authorization signature includes , T.sub.0, and V.sub.0, verifying the authorization signature according to a formula V.sub.0P=P.sub.pubH(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0, P.sub.0), randomly selecting r.sub.i from Z*.sub.q according to a formula r.sub.iZ*.sub.q if it is verified that the authorization signature is valid, computing T.sub.i according to a formula T.sub.i=r.sub.iP, and computing V.sub.i according to a formula V.sub.i=D.sub.i+x.sub.iH.sub.3(m,T.sub.i,P.sub.i)+r.sub.iH.sub.4(m,T.sub.i,P.sub.i), where the partial proxy signature includes , T.sub.0, V.sub.0, T.sub.i, and V.sub.i; where includes identity information of the proxy signature device and identity information of the original signature device; T.sub.0 is obtained through computation by the original signature device according to a formula T.sub.0=r.sub.0P, where r.sub.0 is randomly selected by the original signature device from Z*.sub.q according to a formula r.sub.0Z*.sub.q; V.sub.0 is obtained through computation by the original signature device according to a formula V.sub.0=D.sub.0+x.sub.0H.sub.1(,T.sub.0,P.sub.0)+r.sub.0H.sub.2(,T.sub.0,P.sub.0); x.sub.0(Z*.sub.q) is a first sub-private key of the original signature device; D.sub.0(=sH(ID.sub.0,P.sub.0)) is a second sub-private key of the original signature device; ID.sub.0 is an identifier of the original signature device; is P.sub.0(=x.sub.0P) is a public key of the original signature device; m is a message m input by an input end; and the public parameter further includes H.sub.3(), H.sub.4(), and P.sub.pub.
(132) In this embodiment of the present disclosure, by invoking programs or instructions stored in the memory 18, the processor 15 may be further configured to acquire a multi-proxy signature after a standard signature verification device verifies that a standard signature is valid, where the standard signature includes T and V, where T is obtained through computation by a standard signature computing device according to a formula T=rP, and V is obtained through computation by the standard signature computing device according to a formula V=D.sub.a+x.sub.aH.sub.1(m,T,P.sub.a)+rH.sub.2(m,T,P.sub.a); the multi-proxy signature is obtained through computation by a proxy signature device administrator according to a partial proxy signature of each proxy signature device; and the partial proxy signature is obtained through computation by the proxy signature device according to a private key of the proxy signature device, and verify the multi-proxy signature according to a public key of each proxy signature device; where r is randomly selected from Z*.sub.q according to a formula rZ*.sub.q; a is a sequence number of the standard signature computing device and 0al, where l is a quantity of standard signature computing devices plus one; x.sub.a is a first sub-private key included in a private key of the standard signature computing device; D.sub.a is a second sub-private key included in the private key of the standard signature computing device; m is a message m input by a transmit end; P.sub.a is a public key of the standard signature computing device; and the public parameter includes H.sub.1(), H.sub.2(), and P, where P is a generator of G, and G is a group G whose order is a prime number q.
(133) Further, P.sub.a is obtained through computation by the standard signature computing device according to a formula P.sub.a=x.sub.aP, where x.sub.a is randomly selected by the standard signature computing device from Z*.sub.q according to a formula x.sub.aZ*.sub.q, and D.sub.a is obtained through computation by the standard signature computing device according to a formula D.sub.a=sH(ID.sub.a,P.sub.a); where ID.sub.a is an identifier of the standard signature computing device, s is a master key, and the public parameter includes H() and q.
(134) Further, the standard signature verification device verifies the standard signature according to a formula VP=P.sub.pubH(ID.sub.a,P.sub.a)+P.sub.aH.sub.1(m,T,P.sub.a)+TH.sub.2(m,T,P.sub.a); the standard signature computing device is either of another signature device except an original signature device and the proxy signature device, and the original signature device; the standard signature verification device is any one of the proxy signature device, the original signature device, and the another signature device except the original signature device and the proxy signature device; and the standard signature verification device is different from the standard signature computing device.
(135) The public parameter further includes P.sub.pub.
(136) Further, the processor 15 is configured to determine whether the proxy signature device administrator verifies, according to the partial proxy signature of each proxy signature device, that both of a formula V.sub.0P=H(ID.sub.0,P.sub.0)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0) and a formula V.sub.iP=P.sub.pubH(ID.sub.i,P.sub.i)+P.sub.iH.sub.3(m,T.sub.i,P.sub.i)+T.sub.iH.sub.4(m,T.sub.i,P.sub.i) hold, and if yes, compute the multi-proxy signature according to a formula =(,T.sub.MP,V.sub.MP); where V.sub.0 is obtained through computation by the original signature device according to a formula V.sub.0=D.sub.0+x.sub.0H.sub.1(,T.sub.0,P.sub.0)+r.sub.0H.sub.2(,T.sub.0,P.sub.0); includes identity information of the proxy signature device and identity information of the original signature device, T.sub.0 is obtained through computation by the original signature device according to a formula T.sub.0=r.sub.0P, and r.sub.0 is randomly selected by the original signature device from Z*.sub.q according to a formula r.sub.0Z*.sub.q; is the multi-proxy signature; T.sub.MP=(T.sub.0,T.sub.1, . . . , T.sub.n), where T.sub.i is obtained through computation by a proxy signature device with a sequence number of i according to a formula T.sub.i=r.sub.iP, where r.sub.i is randomly selected by the proxy signature device with the sequence number of i from Z*.sub.q according to a formula r.sub.iZ*.sub.q; V.sub.MP=.sub.i=0.sup.nV.sub.i, where V.sub.i is obtained through computation by the proxy signature device with the sequence number of i according to a formula V.sub.i=D.sub.i+x.sub.iH.sub.3(m,T.sub.i,P.sub.i)+r.sub.iH.sub.4(m,T.sub.i,P.sub.i), i (1in) is a sequence number of the proxy signature device, and n is a quantity of proxy signature devices; and the public parameter further includes H.sub.3() and H.sub.4().
(137) Further, the processor 15 is configured to verify the multi-proxy signature according to a formula V.sub.MPP=P.sub.pub.sub.i=0.sup.nH(ID.sub.i,P.sub.i)+.sub.i=1.sup.nP.sub.iH.sub.3(m,T.sub.i,P.sub.i)+.sub.i=1.sup.nT.sub.iH.sub.4(m,T.sub.i,P.sub.i)+P.sub.0H.sub.1(,T.sub.0,P.sub.0)+T.sub.0H.sub.2(,T.sub.0,P.sub.0).
(138) In this solution, a multi-proxy signature is computed according to a private key, and then the multi-proxy signature is verified according to a public key. Because computing time (which may include time for computing the public key and the private key) of the method in the present disclosure is less than time for computing bilinear pairings, compared with a multi-proxy signature based on the bilinear pairings, this solution decreases a computing amount, thereby reducing computing time. In addition, no certificate is introduced in computing the public key, ensuring that no certificate is disclosed. Computing the private key according to the public key can enable the public key and the private key to restrict each other and avoid a public key replacement attack.
(139) Based on the foregoing descriptions of the implementation manners, a person skilled in the art may clearly understand that the present disclosure may be implemented by software in addition to necessary universal hardware or by hardware only. In most circumstances, the former is a preferred implementation manner. Based on such an understanding, the technical solutions of the present disclosure essentially or the part contributing to the may be implemented in a form of a software product. The software product is stored in a readable storage medium, such as a floppy disk, a hard disk or an optical disc of a computer, and includes several instructions for instructing a computer device (which may be a personal computer, a server, or a network device) to perform the methods described in the embodiments of the present disclosure.
(140) The foregoing descriptions are merely specific implementation manners of the present disclosure, but are not intended to limit the protection scope of the present disclosure. Any variation or replacement readily figured out by a person skilled in the art within the technical scope disclosed in the present disclosure shall fall within the protection scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.