Unlock instant, AI-driven research and patent intelligence for your innovation.

Digital Signature Method in Collaboration with ECC

A technology of digital signature and signed data, which is applied in the field of cryptography, can solve the problems of high complexity of communication and calculation of participants, and achieve the effect of avoiding data exchange and calculation and reducing complexity

Active Publication Date: 2021-05-28
GUANGDONG CERTIFICATE AUTHORITY +1
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional solutions generally have high communication and computational complexity of the participants.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital Signature Method in Collaboration with ECC
  • Digital Signature Method in Collaboration with ECC
  • Digital Signature Method in Collaboration with ECC

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] Embodiment 1: The temporary private key is in the form of additive sharing.

[0090] In one embodiment, the method of constructing the temporary private key based on additive sharing may also be called additive sharing. When the temporary private key is constructed by addition and sharing, its form can be written as k=k 1 +k 2 .

[0091] On the premise that the temporary private key is constructed by additive sharing, the private key can be constructed by additive sharing, and its form can be recorded as d=d 1 +d 2 ; The private key can also be constructed through multiplication and sharing, and its form can be recorded as d=d 1 d 2 . Where d is the shared private key, which is a complete private key, d 1 is the private key share held by participant 1 (referred to as the first private key share in the embodiment of this application), d 2 is the private key share held by participant 2 (denoted as the second private key share in this embodiment of the application)...

Embodiment 2

[0141] Embodiment 2: The temporary private key is shared like multiplication.

[0142] In one embodiment, the method of constructing the temporary private key based on multiplicative sharing may also be referred to as multiplicative sharing. When the temporary private key is constructed by multiplication and sharing, its form can be written as k=k 1 *k 2 .

[0143] On the premise that the temporary private key is constructed by multiplication and sharing, the private key can be constructed by multiplication and sharing, and its form can be recorded as d=d 1 d 2 ; The private key can also be constructed by addition and sharing, and its form can be recorded as d=d 1 +d 2 . Where d is the shared private key, which is a complete private key, d 1 is the private key share held by participant 1 (referred to as the first private key share in the embodiment of this application), d 2 is the private key share held by participant 2 (denoted as the second private key share in this ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a digital signature method in cooperation with ECC. The method in one embodiment includes: the first participant calculates the digest of the data to be signed, obtains the data digest, and sends a first message to the second participant, and the first participant A message carries the data digest; the second participant receives the first message, and synthesizes it based on the second participant's signature shares of the second participant and the data digest to obtain the first participant's signature share ciphertext; The second participant sends a second message to the first participant, and the second message carries the first participant's signature share ciphertext; the first participant decrypts the first participant's signature share ciphertext to obtain the first participant's signature share. This embodiment avoids multiple data exchanges and calculations, and reduces the complexity of communication and calculation.

Description

technical field [0001] This application relates to the technical field of cryptography, in particular to a digital signature method in cooperation with ECC. Background technique [0002] Collaborative computing is a common computing model in contemporary distributed networks; participants who are mutually untrustworthy in the network need to collaboratively calculate the tasks scheduled by all parties without revealing their secrets, providing the privacy of secure multi-party computing, correct Sex and other core functions. The collaborative signature based on the idea of ​​collaborative computing has become the core way to provide unforgeable functions in the collaborative computing process. Among them, the ECDSA signature algorithm, as an internationally recognized elliptic curve digital signature algorithm, has been widely used around the world to provide digital signature integrity. , verifiability and non-repudiation and other core features. However, in some applicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/0819H04L9/085H04L9/30H04L9/3247
Inventor 卢伟龙张永强
Owner GUANGDONG CERTIFICATE AUTHORITY