Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure two-party collaboration SM2 signature method

A safe and signature-generating technology, applied in the field of information security, can solve problems such as difficulty in preventing man-in-the-middle attacks, lack of identity authentication mechanism for both parties in communication, etc.

Active Publication Date: 2018-10-16
SHAANXI NORMAL UNIV +1
View PDF6 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the key generation and signature generation phases of this method, there is no authentication mechanism for the identities of the two communicating parties, and it is difficult to prevent man-in-the-middle attacks, so that the attacker can fake the identity of the first communicating party to generate a complete signature and pass the verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure two-party collaboration SM2 signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] exist figure 1 Among them, the secure two-party cooperative SM2 signature method in this embodiment consists of the following steps.

[0055] (1) System initialization

[0056] The first communication party and the second communication party share the elliptic curve parameter E(F of the SM2 algorithm p ), G and n, E(F p ) represents the finite field F p All rational points of the upper elliptic curve E, including the point O at infinity, are a collection, and G represents the base point of the upper order of the elliptic curve E being n, and n is a finite positive integer. The elliptic curve parameter E(F of the present embodiment p ), the specific values ​​of G and n are the same as those of the parameters in Appendix A.2 of GB / T32918.2-2016. The cryptographic hash method hash that the communication parties agree to use is the cryptographic hash method given in GB / T 32905-2016, that is, the SM3 algorithm; the commitment protocol com is the commitment defined in Fig...

Embodiment 2

[0096] (1) System initialization

[0097] The homomorphic encryption method Enc in this step adopts the Benaloh homomorphic encryption method with additive homomorphism proposed by J. Benaloh in "Dense probabilistic encryption" in 1994. Other steps in this step are the same as in Example 1.

[0098] (2) Negotiation to generate signature public key

[0099] This step is the same as in Example 1.

[0100] (3) Collaborative signature

[0101] Step 1) to step 6) are the same as in Example 1.

[0102] 7) The two parties in the communication cooperate to sign

[0103] The homomorphic encryption method Enc in this embodiment adopts the Benaloh homomorphic encryption method. The second communication party consists of k 2 [*]Q 1 The result is obtained as a point (x 1 ,y 1 ), by x 1 The result obtained by +emodn is used as a partial signature r, where mod represents a modulo operation; a position in [1,n is generated 2 ], according to the encryption operation Benaloh in the B...

Embodiment 3

[0109] (1) System initialization

[0110] The homomorphic encryption method Enc in this step adopts the NS homomorphic encryption method with additive homomorphism proposed by D.Naccache and J.Stern in "A new publickey cryptosystem based on higher residues" in 1998. Other steps in this step are the same as in Example 1.

[0111] (2) Negotiation to generate signature public key

[0112] This step is the same as in Example 1.

[0113] (3) Collaborative signature

[0114] Step 1) to step 6) are the same as in Example 1.

[0115] 7) The two parties in the communication cooperate to sign

[0116] The homomorphic encryption method Enc in this embodiment adopts the NS homomorphic encryption method. The second communication party consists of k 2 [*]Q 1 The result is obtained as a point (x 1 ,y 1 ), by x 1 The result obtained by +emodn is used as a partial signature r, where mod represents a modulo operation; a position in [1,n is generated 2 ], according to the encryption o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure two-party collaboration SM2 signature method consisting of steps of system initialization, negotiation generation of a signature public key, collaborative signature andoutput of a complete signature. According to the secure two-party collaboration SM2 signature method provided by the invention, prior to the negotiation of the signature public key and the collaborative signature, the both communication parties authenticate the identity of the opposite party by using the zero knowledge proof technology, the correctness of outputting the complete signature is ensured by using the promise technology, it is ensured that the first communication party does not need to decrypt a received ciphertext by using the homomorphic encryption technology, the operation of the corresponding ciphertext can be realized, and a timestamp mechanism is added to ensure that the both communication parties can output the complete signature only when the identity of the first communication party, the current time and the position information of the first communication party are consistent, so that the security of the system is greatly improved, the loss caused by the leakage ofa signature private key is reduced, and the man-in-the-middle attack can be prevented. The secure two-party collaboration SM2 signature method provided by the invention has higher security and can beused in an environment in which a communication channel is not safe.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a safe two-party cooperative SM2 signature method. Background technique [0002] In order to meet the application requirements of the electronic authentication service system, on December 17, 2010, the State Cryptography Administration released the SM2 elliptic curve public key cryptography algorithm, and formulated the national standard GB / T 32918. The second part of the standard describes an elliptic curve-based signature algorithm, the SM2 signature algorithm. The signature algorithm includes a digital signature generation algorithm and a verification algorithm. The signature generation algorithm is to realize the function of the signer to generate a digital signature on the data, and the verification algorithm is to realize the function of the verifier to verify the reliability of the signature. Each signer generates a pair of keys: a public key and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04L9/00
CPCH04L9/008H04L9/0838H04L9/0869H04L9/3073H04L9/3221H04L9/3247
Inventor 候红霞杨波张明瑞任伟王瑞瑆
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products