Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SM2 digital signature method based on two-party collaboration

A digital signature and signature generation technology, applied in the field of information security, can solve problems such as damage to security and fairness, loss of interests, etc., to achieve the effect of improving fairness and ensuring security

Active Publication Date: 2018-10-16
WUHAN UNIV
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after recovering the complete signature key, the party holding the complete signature key can sign independently without the knowledge of other parties, thus undermining the security and fairness of the system
Especially in the case of only two parties, if one party restores and holds the complete signature key, it can sign independently without the knowledge of the other party, causing loss of benefits to the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2 digital signature method based on two-party collaboration
  • SM2 digital signature method based on two-party collaboration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0028] The present invention proposes an SM2 digital signature method based on two-party cooperation, and a specific description is given below.

[0029] Symbols and definitions:

[0030] G: base point on the elliptic curve;

[0031] h(): cryptographic hash function;

[0032] A, B: two parties involved in the signature;

[0033] d A , d B : The private key corresponding to the signing party A and B;

[0034] P A ,P B : The public key corresponding to the signature participant;

[0035] P AB : The publicly available public key used to verify the correctness of the final signature;

[0036] sk: session key;

[003...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SM2 digital signature method based on two-party collaboration, which is specifically as follows: two parties participating in the signature respectively generate respectivepublic-private key pairs (dA, PA), (dB, PB) and signature verification public keys PAB; and during the signature, A and B negotiate a session key sk at first. Then, A and B respectively select randomnumbers kA belongs to Zn, kB belongs to Zn, calculate RA=[kA]G and RB=[kB]G, and encrypts the RA=[kA]G and RB=[kB]G by using the session key and sends the RA=[kA]G and RB=[kB]G to the opposite party.At last, the A calculates a partial signature; the B calculates a partial signature and sends the partial signature to the A in the form of a ciphertext. The SM2 digital signature method disclosed bythe invention is applicable to the two parties to compete the SM2 cooperative signature together without leaking the respective partial signatures, the two parties must participate in the signature generation process at the same time, and no complete signature key is restored in the signature generation process, thereby ensuring the security of the signature key and improving the fairness of the two parties to participate in the signature.

Description

technical field [0001] The invention relates to information security technology, in particular to an SM2 digital signature method based on cooperation between two parties. Background technique [0002] Digital signature is the simulation of traditional handwritten signature in the digital environment, which can provide the unforgeability, authenticity and integrity of digital information. Typically, one party generates a digital signature that can be publicly verified by other parties. With the development of the Internet, digital signature technology has been used in many fields such as finance, commerce, military affairs and diplomacy. In order to reduce the risks caused by the concentration of signing rights or the loss of signing keys, some special documents, such as highly confidential documents, usually require the cooperation of multiple people to complete the signing. [0003] A common solution to this kind of problem is to use a threshold secret sharing scheme. I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/083H04L9/0838H04L9/0869H04L9/3073H04L9/3247
Inventor 何德彪王婧张语荻冯琦
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products