Multiparty joint key production and digital sign method and system

A technology of digital signature and joint signature, which is applied in the field of information security and can solve problems such as hidden private key security leakage.

Active Publication Date: 2017-08-04
BEIJING JN TASS TECH
View PDF6 Cites 61 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the respective private keys of each party are synthesized into a signature private key before performing the signature calculation, or the keys of each party are first generated and then decomposed and then kept by each party, there is a significant risk of private key security leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiparty joint key production and digital sign method and system
  • Multiparty joint key production and digital sign method and system
  • Multiparty joint key production and digital sign method and system

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0171] This embodiment relates to the three-party key generation process and the realization of digital signatures. A typical application is that a partner company has three main leaders, namely the first party: chief financial officer, the second party: general manager and the third party : Chairman. Important documents of the company require three parties to jointly digitally sign the document. Each of the three parties has a private key factor of the company's signature private key. Only the joint signature of the three parties can complete the digital signature of the company's important documents. And agree that the order of signature is the chief financial officer, the general manager, and the chairman, that is, the order is the first party, the second party, and the third party. The signing devices of the three parties can be their personal computers, mobile phones or special signing devices, such as USB-KEY.

[0172] Such as Figure 5 As shown, the following examples...

example 2

[0192] This embodiment relates to the non-central four-party key generation process and the realization of digital signatures. Another feature of the present invention is reciprocity, that is, the m joint signers are equal to each other, and there may be no upper-lower relationship. This example uses an example composed of four joint signers to illustrate their peer-to-peer key generation process and the realization of digital signatures.

[0193] refer to Figure 6 , Figure 6 It is a schematic diagram of the four-party non-center joint key generation and digital signature process with m=4. For the sake of showing that their status is equal, it is assumed that the four joint parties are respectively A, B, C, and D. This example is only to illustrate the peer-to-peer relationship between the parties, so the process of generating and transferring the public key factors of all parties is ignored.

[0194] 1. No central four-party key generation process

[0195] Assume in adv...

Embodiment 3

[0214] This embodiment relates to the central four-party key generation process and the realization of digital signatures.

[0215] The multi-party joint key generation and digital signature method can also be a system with a center, which is characterized in that the center is responsible for all contact and communication with the joint, so that all parties do not need to send messages or results to each other. Under the coordination of the center, all parties use their own private key factors to complete joint key generation and digital signature. In the case of a center, the parties to the joint signature and the center can also have a mutually exclusive encryption key pair, which can encrypt the information between the parties and the center, and can also sign the information to ensure Confidentiality and authenticity of information between parties and the Center.

[0216] A typical application is that a joint-stock company A has four shareholders. The important documents...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multiparty joint key production and digital sign method and system. A joint sign private key d is composed of m private key factors di. The i is equal to [1, m]. The m is greater than or equal to 3. The m private key factors di are produced by the joint parties independently and secretly when the private key is produced and are stored in own devices secretly. The joint digital sign is finished by the parties according to a certain sequence and is finished jointly through utilization of the secretly stored key factors di based on calculation. The system comprises m joint parties. Each joint party has an independent subsystem. Each subsystem is composed of three parts: a joint key production module, a joint sign first component calculation module and a joint sign second component calculation module. According to the method and the system, the multiparty joint key production and digital sign method of an SM2 cryptographic algorithm and various formed systems: acentric and centered systems are realized. The digital sign is no longer finished by a single individual and is finished by multiple parities jointly.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a multi-party joint key generation and digital signature method and system. Background technique [0002] According to the application, the asymmetric or public key cryptosystem can be used to generate a key pair (d, P), including a public key P and a private key d. The private key d is kept secret and is mainly used for digital signature S of specific data. In view of the increasingly widespread use of the Internet, it is possible for mobile APPs, service centers, signature centers, and multiple service entities to jointly perform user signatures with terminals. [0003] The traditional method is that the signing device independently and secretly produces a set of key pairs (d, P), and keeps the private key d secretly. When a digital signature is required, the signing device independently uses the private key d to calculate the digital signature value Sign=(r, s)....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0861H04L9/0869H04L9/30H04L9/3247H04L9/3252
Inventor 闫鸣生李增欣闫申杨恒亮曲金宝唐英
Owner BEIJING JN TASS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products