Distributed signature method and system based on identity

A distributed and identity technology, applied in the field of information key security, can solve the problems of key generation center PKG security risks, private key leakage, etc., achieve safe and reliable digital signature business, overcome untrustworthiness, and improve security

Active Publication Date: 2017-06-13
BEIJING SANSEC TECH DEV
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is: in the current technical scheme, the key generation center PKG has potential safety hazards, which may easily cause the leakage of the private key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed signature method and system based on identity
  • Distributed signature method and system based on identity
  • Distributed signature method and system based on identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0033] as attached figure 1 , figure 2 and image 3 As shown, an identity-based distributed signature method, the distributed signature method includes the following steps:

[0034] Both the client and the server support the SM2 standard algorithm, the SM2 elliptic curve parameters E(Fp), G and n, the elliptic curve E is an elliptic curve defined on the finite prime number field Fp, and G is the nth order base point on the elliptic curve E. The user identity eld mentioned below refers to the one that can uniquely identify the user in a security domain (or within the application range of the information system), such as mobile phone number, email address, ip address, Weibo account, WeChat ID, QQ number , bank acc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a distributed signature method and system based on identity. The distributed signature method comprises a user registration phase and a distributed signature phase, the user registration phase comprises: a client maintains two pairs of public and private keys at first, one pair is fixed public and private keys, and the other pair is temporary public and private keys; a server also maintains two pairs of fixed public and private keys, one pair is fixed public and private keys, and the other pair is temporary public and private keys generated after signature activity is initiated; the client sends user identity and the fixed public keys to the server, the server calculates a part of private keys and a part of corresponding public keys by using its own fixed public and private keys, and opens a part of public keys; and the distributed signature phase comprises: the server accomplishes signature preprocessing work and sends proxy signature to the client, and the client performs signature authorization work at last to obtain a signature message. By adoption of the distributed signature method and system provided by the invention, the defect that key generation center PKG cannot be trusted is overcome, and meanwhile, if the security of the client cannot be guaranteed, the private keys are not leaked.

Description

technical field [0001] The invention relates to the technical field of information key security, in particular to an identity-based distributed signature method and system. Background technique [0002] With the development of science and technology, the functions of mobile terminals are becoming more and more perfect. At the same time, various security and privacy issues on mobile terminals are gradually exposed. On mobile terminals, measures such as digital signatures can effectively solve related information security issues to ensure data security and reliability. [0003] Digital signature is an important part of modern information security. The application of digital signature technology can identify tampering and masquerading, and can effectively prevent denial. Secure digital signatures determine the identities of both parties in applications such as electronic documents and electronic contracts, and are the basis for ensuring the authenticity of information. With t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04L9/32H04L9/30
CPCH04L9/3066H04L9/3252H04W12/04H04W12/06
Inventor 杨国强刘会议
Owner BEIJING SANSEC TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products