Supercharge Your Innovation With Domain-Expert AI Agents!

Signature method and apparatus based on elliptic curve, computer device and storage medium

An elliptic curve and signature information technology, applied in secure communication devices, user identity/authority verification, digital transmission systems, etc., can solve the limited ability to protect private keys, application scenarios that cannot meet all needs, and risks in signature systems, etc. problem, to achieve the effect of improving safety

Inactive Publication Date: 2018-05-18
SHANGHAI PEOPLENET SECURITY TECH
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, traditional application scenarios can no longer meet all requirements. In some scenarios, the client needs to generate a signature, and the server verifies the signature. In this scenario, the client uses the private key to sign, and the server uses the public key to verify the signature.
As a weak end (such as a smartphone), the client is limited in its ability to protect the private key. Once the private key is leaked, the attacker can forge the signature, which puts the entire signature system at risk.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature method and apparatus based on elliptic curve, computer device and storage medium
  • Signature method and apparatus based on elliptic curve, computer device and storage medium
  • Signature method and apparatus based on elliptic curve, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] figure 1 The flow chart of an elliptic curve-based signature method provided by Embodiment 1 of the present invention, this embodiment is applicable to the case of signature, and the method can be executed by an elliptic curve-based signature device, which can be integrated in the first communication end. As the signing party, the first communication end may be a client or a server. like figure 1 As shown, the method specifically includes the following steps:

[0077] S110. The first communication terminal generates a first random number k 1 , and according to the first random number k 1 and the base point G of the elliptic curve to calculate the first signature factor Q 1 .

[0078] Among them, the first random number k 1 Can be generated by software and / or hardware, such as a random number generator or a random number generator, used to generate random numbers based on a given range, for example, can be generated in the interval [1, n-2] An integer within , wh...

Embodiment 2

[0102] figure 2 It is a flow chart of an elliptic curve-based signature method provided by Embodiment 2 of the present invention. This embodiment is applicable to the case of signing. communication end. The second communication end may serve as a signature verifier, and may be a client or a server. like figure 2 As shown, the method specifically includes the following steps:

[0103] S210. The second communication terminal receives the first signature factor Q sent by the first communication terminal 1 and the preprocessing result e; where Q 1 For the generation process of and e, refer to the above-mentioned embodiment.

[0104] S220. The second communication terminal generates a fourth random number k 2 and the fifth random number k 3 , and according to the first signature factor Q 1 , the fourth random number k 2 and the fifth random number k 3 Calculate the point on the elliptic curve (x 1 ,y 1 );

[0105] The fourth random number k 2 and the fifth random nu...

Embodiment 3

[0135] This embodiment provides an elliptic curve-based signature method, which is a process of two-sided interaction. The formula parameters in this embodiment are the same as those in the foregoing embodiments, and will not be repeated here. The following describes the three stages of signature initialization, signature generation and signature verification.

[0136] First, it is the process of signature initialization, that is, the process of public key generation, including:

[0137] Step 11, the first communication terminal generates a second random number d 1 ;

[0138] Step 12, the first communication terminal calculates the key information P through the elliptic curve 1 = d 1 -1 · G, and sent to the second communication terminal, wherein · represents the point multiplication operation of the elliptic curve, G represents the base point of the elliptic curve, and the key information is used for the third random number d generated by the second communication terminal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a signature method and apparatus based on an elliptic curve, a computer device and a storage medium. The method comprises the following steps: generating, by a first communication terminal, a first random number k1, and calculating a first signature factor Q1 according to k1 and an elliptic curve base point G; calculating a to-be-signed message according to a preset hash algorithm to obtain a preprocessing result e; sending Q1 and e to a second communication end; receiving first signature information r, a second signature factor s1 and a third signature factor s2 sent by the second communication terminal; and generating second signature information s according to k1 and second random numbers d1, r, s1, and s2 to obtain a signature result (r, s). Through the interaction calculation of both parties of the communication, the second signature information generated by the first communication terminal and the first signature information generated by the second communication terminal constitute the signature result, and the real private key does not appear in the first communication terminal or the second communication terminal in any form, so that the security ofthe signature is improved.

Description

technical field [0001] The present invention relates to the fields of mobile security and computer programs, in particular to an elliptic curve-based signature method, device, computer equipment and storage medium. Background technique [0002] As network security issues become more and more serious, the impact is also growing. Digital signatures are used to realize the reliability of user identity and the integrity of information. [0003] In the traditional signature process, the signer generates a public-private key pair, signs the message with the private key, and sends the message, public key, and signature result to the signature verifier, who uses the public key to verify the signature. In traditional application scenarios, the server is usually the signer, and the client is the signature verifier. Assuming that the server is relatively safe, the private key will not be leaked, and only the public key needs to be protected (to prevent it from being replaced). For exa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3252H04L9/3255
Inventor 谈剑锋马逸龙杨德光姜立稳
Owner SHANGHAI PEOPLENET SECURITY TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More