SM9 joint digital signature method and SM9 joint digital signature device

A digital signature and pre-signature technology used in digital transmission systems, secure communication devices, key distribution

Active Publication Date: 2017-12-05
SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Effective protection of private keys in insecure environments such as mobile devices is facing challenges. This invention designs a joint signature based on SM9 to deal with the problem of private key protection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM9 joint digital signature method and SM9 joint digital signature device
  • SM9 joint digital signature method and SM9 joint digital signature device
  • SM9 joint digital signature method and SM9 joint digital signature device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0080] refer to figure 1 and figure 2 , an embodiment of the present invention provides a SM9 joint digital signature method, including the steps:

[0081] S1. The signature client obtains the first fragmented sub-key M of the identification private key S_A corresponding to its identification, wherein the second fragmented sub-key N of the identification private key S_A is obtained by the signature server corresponding to the signature client Obtain; wherein, the key generation center randomly selects the master key to generate the system parameter group. .

[0082] In step S1, the above-mentioned system parameter group includes 1 , P 2 , [s]P 1 , g=e(P 1 , [s]P 2 ), H>, where E is an elliptic curve, and e represents a binary mapping e:G 1 ·G 2 →G t , G 1 and G 2 are two point groups on the elliptic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SM9 joint digital signature method and an SM9 joint digital signature device. An identification private key S_A generated by a key generation center is divided to two parts: a first sub key M and a second sub key N at a signature client, a signature server, or a third party, the first sub key M and the second sub key N are stored in the two entities of the signature client and the signature server respectively, after the signature client and the signature server use the first sub key M and the second sub key N to sign a message m, a complete effective signature corresponding to the S_A is synthesized by the signature client, and when the sub key of any party of the signature client and the signature server gets lost, the integral security of the identification private key S_A is not influenced, and the digital signature security is further improved.

Description

technical field [0001] The present invention relates to the field of digital signature, in particular to a SM9 joint digital signature method and device. Background technique [0002] The SM9 identification cryptographic algorithm is a bilinear pair-based identification cryptographic algorithm, which can use the user's identity to generate the user's public and private key pair, mainly used for digital signature, data encryption, key exchange and identity certification, etc. In the existing digital signature process, if the key is lost, the security of the signature will be affected. Therefore, the identification private key needs to be strictly protected. Effective protection of private keys in unsafe environments such as mobile devices faces challenges. The present invention designs a SM9-based joint signature of both parties to deal with the problems of private key protection. SUMMARY OF THE INVENTION [0003] The main purpose of the present invention is to provide a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0866H04L9/0869H04L9/3066H04L9/3252
Inventor 程朝辉周枭淳杜峰
Owner SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products