Signature method and device for generating SM2 algorithm through mutual coordination, and storage medium

A two-party, algorithmic technology, applied in the field of information security and cryptography, can solve the problem that the user's private key is easy to be stolen

Active Publication Date: 2019-01-18
北京信安世纪科技股份有限公司
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a signature method, device and storage medium for both parties to collaboratively generate the SM2 a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature method and device for generating SM2 algorithm through mutual coordination, and storage medium
  • Signature method and device for generating SM2 algorithm through mutual coordination, and storage medium
  • Signature method and device for generating SM2 algorithm through mutual coordination, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0148] The embodiment of the present invention provides a signature method, device and storage medium for both parties to collaboratively generate the SM2 algorithm to solve the technical problem in the prior art that the user's private key is easily stolen without using cryptographic hardware.

[0149] The technical solutions in the embodiments of this application are to solve the above-mentioned technical problems, and the general idea is as follows:

[0150] Provide a signature method for both parties to collaboratively generate the SM2 algorithm, including: receiving the intermediate information sent by the second participant and determined according to the signature output party identifier; wherein the intermediate information carries at least the part related to the generation of the second part signature of the message to be signed Information; Based on the signature output party identification, determine the participant who outputs the complete signature of the message to be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a signature method and device for generating an SM2 algorithm through mutual coordination, and a storage medium, and solves the problem that a user private key is easily stolenin the prior art under the condition of no cryptographic hardware. The signature method implemented by a first participant includes the steps: receiving intermediate information determined by a second participant according to a signature output party identifier; determining a participant of the complete signature of the to-be-signed message based on the signature output party identifier; generating a second partial signature of the to-be-signed message by using a first sub-private key and the intermediate information if the first participant outputs the complete signature, and outputting thecomplete signature consisting of the first partial signature and the second partial signature carried in the intermediate information; generating a first intermediate signature through the first sub-private key and the intermediate information of the second participant outputs the complete signature, and sends the first intermediate signature to the second participant, so that the second participant can generate a second partial signature of the to-be-signed message by using a second sub-private key and the first intermediate signature, so as to determine the complete signature.

Description

Technical field [0001] The present invention relates to the field of information security and cryptography, in particular to a signature method, device and storage medium for both parties to collaboratively generate an SM2 algorithm. Background technique [0002] In the traditional Internet, in order to protect the security of users’ online business, cryptographic technologies such as digital signatures and encryption and decryption based on PKI (Public Key Infrastructure) are often used to verify the authenticity of users’ identities and ensure the confidentiality of information. Integrity and non-repudiation of the signer, etc. In PKI-based applications, the protection of private keys is of paramount importance. Traditional mode usually equips users with USBKey, SmartCard and other security hardware peripherals to ensure the security of private keys. [0003] With the rapid development and application of mobile Internet and cloud computing, mobile smart terminals and "thin clie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3066H04L9/3252
Inventor 刘婷汪宗斌
Owner 北京信安世纪科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products