ECDSA algorithm-based signature generation method and apparatus, and data processing system

A technology for generating signatures and algorithms, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve the problems that the holder of the private key is easy to be attacked, the private key is easy to be stolen, and the encryption system fails, etc. The risk of private key being stolen, the effect of increasing difficulty

Active Publication Date: 2018-04-13
陈彦丰 +1
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] In the process of researching the related prior art, the inventors of the embodiments of the present disclosure found that the holder of the private key is relatively easy to be compromised, resulting in the private key being easily stolen, which in turn leads to the failure of the entire encryption system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ECDSA algorithm-based signature generation method and apparatus, and data processing system
  • ECDSA algorithm-based signature generation method and apparatus, and data processing system
  • ECDSA algorithm-based signature generation method and apparatus, and data processing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] It should be understood that the specific embodiments described here are only used to explain the present disclosure, not to limit the present disclosure.

[0057] figure 1 A schematic diagram showing the structure of the signature system provided by an embodiment of the present disclosure, figure 1 The scenario shown in is a typical application scenario of the signature generation method based on the ECDSA algorithm provided by an embodiment of the present disclosure. Please refer to figure 1 , the system includes at least two electronic devices, which are referred to as a first electronic device 100 and a second electronic device 200 for convenience of description. continue to refer figure 1 , the first electronic device 100 includes a processor 110 , a memory 120 and a communication module 130 ; and the corresponding first electronic device 200 includes a processor 210 , a memory 220 and a communication module 230 . In each electronic device, the communication mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the disclosure relates to an ECDSA algorithm-based signature generation method and apparatus, and a data processing system. According to the embodiment of the disclosure, during thepublic key generation process, partial public keys are generated at two electronic devices based on different parameter groups; the partial public keys generated by the two electronic devices are combined to obtain an integrated public key, so that the private key is not generated completely at any electronic device. Therefore, no integrated private key can be obtained even when one electronic device is cracked, so that the difficulty of stealing the private key is improved and the risk of stealing the private key is reduced. Moreover, during the signature generation process, encryption is carried out at the two electronic device respectively based on different parameter groups, so that the signature operation process is completed.

Description

technical field [0001] The embodiments of the present disclosure relate to the technical field of encryption, and in particular to a signature generation method, device and data processing system based on the ECDSA algorithm. Background technique [0002] A digital signature of a message is a number that depends on some secret known only to the signer, which in turn depends on the content of the message being signed. Signatures should be verifiable. If a dispute arises over whether a party signed the document (either due to the signer's attempt to disprove the signature that it did create, or due to a fraudulent claim), an unbiased third party should be able to resolve the matter impartially without access to Signer's secret information (eg, private key). [0003] Digital signatures have many applications in information security, in particular, they are used in cryptographic schemes. Some applications include authentication, data integrity and non-repudiation. A particul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0861H04L9/3066H04L9/3252
Inventor 闵波
Owner 陈彦丰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products