首页>
外国专利>
A method for the application of implicit signature schemes
A method for the application of implicit signature schemes
展开▼
机译:一种隐式签名方案的应用方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
The present invention refers to a method of authenticating a transaction over a data communication system between a first correspondent (12) and a second correspondent (14) through use of a certifying authority (20), upon one of said first and second correspondents (12,14) advising said certifying authority (20) that a transaction is to be validated. Said method comprises the steps of said first correspondent (12) receiving from said certifying authority (20) at least one of a set of implicit signature components ( s i ) generated by said certifying authority (20) for permitting said first correspondent (12) to generate an ephemeral private key (a i ), said first correspondent (12) generating an ephemeral private key (a i ) using said at least one of said set of implicit signature components received from said certifying authority (20), and said first correspondent (12) signing a message (m) with said ephemeral private key (a i ) to generate a signature and forwarding said message (m) and said signature to said second correspondent (14), whereby said second correspondent (14) can verify said signature using an ephemeral public key ( a i P ) generated from selected ones of said set of implicit signature components received from said certifying authority (20) and proceed with said transaction upon verification. The present invention further refers to a certificate generated by a certifying authority (20), a system for performing said method, and a computer readable medium having stored thereon computer readable instructions for performing the method.
展开▼