Digital signature method for cooperative SM2

A technology of digital signature and signed data, applied in the field of cryptography, it can solve the problem of high communication and computational complexity of participants, and achieve the effect of avoiding data exchange and operation and reducing complexity

Active Publication Date: 2018-10-16
GUANGDONG CERTIFICATE AUTHORITY +1
View PDF6 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional solutions generally have high communication and computational complexity of the participants.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature method for cooperative SM2
  • Digital signature method for cooperative SM2
  • Digital signature method for cooperative SM2

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] Embodiment 1: The private key is shared in the form of addition.

[0090] In one embodiment, the method of constructing the private key based on additive sharing may also be called additive sharing. When the private key is constructed by additive sharing, the form in one embodiment can be written as d=d 1 +d 2 -1.

[0091] On the premise that the private key d is constructed by additive sharing, a temporary private key can be constructed by additive sharing, and its form can be recorded as k=k 1 +k 2 ; It is also possible to construct a temporary private key through multiplication and sharing, and its form can be recorded as k=k 1 k 2 . Where d is the shared private key, which is a complete private key, d 1 is the private key share held by participant 1 (referred to as the first private key share in the embodiment of this application), d 2 is the private key share held by participant 2 (denoted as the second private key share in this embodiment of the applicatio...

Embodiment 2

[0145] Embodiment 2: The private key is shared in the form of multiplication.

[0146] In one embodiment, the method of constructing a private key based on multiplication sharing may also be referred to as multiplication sharing. In an embodiment, when the private key is constructed by multiplication and sharing, its form can be recorded as d=d 1 d 2 -1.

[0147] On the premise that the private key is constructed by multiplication and sharing, a temporary private key can be constructed by multiplication and sharing, and its form can be recorded as k=k 1 k 2 ; It is also possible to construct a temporary private key through addition and sharing, and its form can be recorded as k=k 1 +k 2 . Where d is the shared private key, which is a complete private key, d 1 is the private key share held by participant 1 (referred to as the first private key share in the embodiment of this application), d 2 is the private key share held by participant 2 (denoted as the second private ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a digital signature method for cooperative SM2. The method in one embodiment comprises the following steps: a first participant calculates SM2 algorithm summary dataand the summary of the to-be-signed data, obtains a data summary, and sends a first message to a second participant, and the first message carries the data summary; the second participant receives thefirst message, determines a second participant signature share of the second participant based on the data summary, and performs synthesis based on the second participant signature share to obtain afirst participant signature share ciphertext; the second participant sends a second message to the first participant; the second message carries the first participant signature share ciphertext; the first participant decrypts the first participant signature share ciphertext and obtains the first participant signature share. The embodiment avoids multiple data exchanges and operations, thereby reducing the complexity of communication and calculation.

Description

technical field [0001] This application relates to the technical field of cryptography, in particular to a digital signature method in cooperation with SM2. Background technique [0002] Collaborative computing is a common computing model in contemporary distributed networks; participants who are mutually untrustworthy in the network need to collaboratively calculate the tasks scheduled by all parties without revealing their secrets, providing the privacy of secure multi-party computing, correct Sex and other core functions. The collaborative signature based on the idea of ​​collaborative computing has become the core way to provide unforgeable functions in the process of collaborative computing. Among them, the national secret SM2 signature algorithm, as a nationally recognized elliptic curve digital signature algorithm, has been widely used throughout the country, providing digital signatures. Core features such as integrity, verifiability, and non-repudiation. In some a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04L9/00
CPCH04L9/008H04L9/0869H04L9/3066H04L9/3218H04L9/3236H04L9/3247H04L9/3271
Inventor 卢伟龙张永强
Owner GUANGDONG CERTIFICATE AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products