A distributed signature method and system based on elliptic curve
An elliptic curve, distributed technology, applied in the field of information security, can solve the problems of middleware development difficulty and middleware development difficulty, and achieve the effect of simple and convenient protocol, simple and convenient implementation, and guaranteed effectiveness.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.
[0036] Such as figure 2 As shown, a distributed signature method based on elliptic curve, the signature method includes the following steps:
[0037] The client, the signature agency center and the signature business center all support the elliptic curve parameters E(Fp), G and n of the SM2 standard algorithm. The elliptic curve E is an elliptic curve defined on the finite prime number field Fp, and G is n on the elliptic curve E. base point, .
[0038] S1, the client registers to generate a pair of fixed public and private keys permanently bound to the user (P C , d C ), the client's own fixed public key P C Send to Signature Agency Center;
[0039] S2, the signature agency center according to the public key ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

