FIELD: information technologies.
SUBSTANCE: secret key is generated in the form of at least two elements each one of which represents at least one bit string (BS); in accordance to secret key, open key is generated in the form of at least one BS. In this process when open key is generated the first and the second elements of secret key are raised to the degrees of z1-bit binary number ω1 and z2-bit binary number ω2 respectively where ω1≠ω2, z1 > 16 and z2 > 16, electronic document (ED) is received represented by at least one BS H, depending on received ED and secret key value EDS is generated in the form of at least two BSs; the first F and the second B checking BS are generated; compare them and when their parametres coincide conclusion is made about EDS authenticity.
EFFECT: increase in productivity of EDS algorithms without lowering its survivability level.
7 cl, 5 tbl, 2 ex, 1 app
Authors
Dates
2010-01-27—Published
2008-07-24—Filed