Digital Signature Method in Collaboration with ECC
A technology of digital signature and signed data, which is applied in the field of cryptography, can solve the problems of high complexity of communication and calculation of participants, and achieve the effect of avoiding data exchange and calculation and reducing complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0089] Embodiment 1: The temporary private key is in the form of additive sharing.
[0090] In one embodiment, the method of constructing the temporary private key based on additive sharing may also be called additive sharing. When the temporary private key is constructed by addition and sharing, its form can be written as k=k 1 +k 2 .
[0091] On the premise that the temporary private key is constructed by additive sharing, the private key can be constructed by additive sharing, and its form can be recorded as d=d 1 +d 2 ; The private key can also be constructed through multiplication and sharing, and its form can be recorded as d=d 1 d 2 . Where d is the shared private key, which is a complete private key, d 1 is the private key share held by participant 1 (referred to as the first private key share in the embodiment of this application), d 2 is the private key share held by participant 2 (denoted as the second private key share in this embodiment of the application)...
Embodiment 2
[0141] Embodiment 2: The temporary private key is shared like multiplication.
[0142] In one embodiment, the method of constructing the temporary private key based on multiplicative sharing may also be referred to as multiplicative sharing. When the temporary private key is constructed by multiplication and sharing, its form can be written as k=k 1 *k 2 .
[0143] On the premise that the temporary private key is constructed by multiplication and sharing, the private key can be constructed by multiplication and sharing, and its form can be recorded as d=d 1 d 2 ; The private key can also be constructed by addition and sharing, and its form can be recorded as d=d 1 +d 2 . Where d is the shared private key, which is a complete private key, d 1 is the private key share held by participant 1 (referred to as the first private key share in the embodiment of this application), d 2 is the private key share held by participant 2 (denoted as the second private key share in this ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


