Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security protocol method, computer device and storage medium

A security protocol and security technology, applied in the field of cryptography, can solve problems such as no practical value and insecurity, and achieve the effect of improving efficiency and execution efficiency

Active Publication Date: 2018-12-21
GUANGDONG CERTIFICATE AUTHORITY +1
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the final calculated RSA modulus N and the published intermediate result N 1 Between, the common factor (a+b) can be obtained by calculating the greatest common divisor, so it is not safe and has no practical value

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protocol method, computer device and storage medium
  • Security protocol method, computer device and storage medium
  • Security protocol method, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0027] The application environment of the security protocol method of the present application in one embodiment involves two devices, namely, device one and device two. In some embodiments, the device one may be a terminal, and the device two may be a server, so that the terminal and server The security protocol processing process between them. Device 1 and Device 2 can specifically be desktop terminals, mobile terminals, and other devices that can or are used to coordinate security protocol processing. When Device 2 is a server, it can be an independent server or a server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security protocol method, a compute device and storage medium. The method of one embodiment includes: after determining the middle component of current participant based on the additive shared component of current participant of the prime number to be determined, sharing the power exponent approximate integer of the prime number to be determined with the opposite participant to obtain the powerexponent approximate integer shared component of current participant; Sharing the modular operation result with the opposite participant, obtaining the shared component of the current participant modular operation, sequentially performing polynomial multiplication sharing and modulo-digital operation with the opposite participant, and obtaining the shared secret component of the current participant; after the current participant exchangesshared secret component of the current participant, When the recovered first shared secret coincides with the recovered second shared secret of the opposite end participant, returning the operation result of the shared modulo finger until the number of cycles reaches the preset safe number of cycles, and when the first shared secret and the second shared secret coincide in each cycle of the preset safe number of cycles, judging the primes to be determined to be prime numbers.

Description

technical field [0001] The invention relates to the technical field of cryptography, in particular to a security protocol method, computer equipment and computer storage medium. Background technique [0002] The RSA distributed key, by storing the components of the RSA private key in each participant, requires each participant to cooperate to execute the RSA signature generation operation when performing RSA signature. Taking RSA distributed key escrow as an example, by storing the components of the RSA private key on the escrow platform and the client separately, the client and the escrow platform are required to perform the RSA signature generation operation in cooperation, thereby preventing the key escrow organization from abusing power. In order to ensure the security of the private key of the distributed key, at the stage of generating the private key, two or more participants are required to generate the private key component by executing the secure multi-party comput...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30
CPCH04L9/302H04L9/3033
Inventor 张永强
Owner GUANGDONG CERTIFICATE AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products