The signature method, device and storage medium of the sm2 algorithm jointly generated by the two parties

An algorithm and technology of both parties, applied in the field of information security and cryptography, can solve the problem of easy theft of the user's private key, and achieve the effect of improving security

Active Publication Date: 2021-10-01
北京信安世纪科技股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a signature method, device and storage medium for both parties to collaboratively generate the SM2 algorithm to solve the technical problem in the prior art that the user's private key is easily stolen without using cryptographic hardware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • The signature method, device and storage medium of the sm2 algorithm jointly generated by the two parties
  • The signature method, device and storage medium of the sm2 algorithm jointly generated by the two parties
  • The signature method, device and storage medium of the sm2 algorithm jointly generated by the two parties

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0148] Embodiments of the present invention provide a signature method, device and storage medium for both parties to synergistically generate the SM2 algorithm, so as to solve the technical problem in the prior art that the user's private key is easily stolen without using cryptographic hardware.

[0149] The technical solutions in the embodiments of the present application are to solve the above-mentioned technical problems, and the general idea is as follows:

[0150] Provide a signature method for both parties to collaboratively generate the SM2 algorithm, including: receiving intermediate information sent by a second participant and determined according to the signature output party identifier; wherein, the intermediate information at least carries the part related to generating the second part of the signature of the message to be signed. information; based on the signature output party identification, determine the participant who outputs the complete signature of the me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a signature method, a device and a storage medium for both parties to cooperatively generate an SM2 algorithm, and solves the problem in the prior art that a user's private key is easily stolen without using cryptographic hardware. The signature method implemented by the first participant includes: receiving the intermediate information determined by the second participant according to the signature output party identifier; and determining the participant that outputs the complete signature of the message to be signed based on the signature output party identifier; if the first participant To output a complete signature, use the first sub-private key and intermediate information to generate the second part of the signature of the message to be signed, and output the complete signature composed of the first part of the signature and the second part of the signature carried in the intermediate information; if the second part of the signature If the party outputs a complete signature, then use the first sub-private key and intermediate information to generate and send the first intermediate signature to the second participant, so that the second participant can use the second sub-private key and the first intermediate signature to generate the message to be signed The second part is signed to determine the full signature.

Description

technical field [0001] The invention relates to the fields of information security and cryptography, in particular to a signature method, a device and a storage medium for collaboratively generating an SM2 algorithm by both parties. Background technique [0002] In the traditional Internet, in order to protect the security of users' online business, cryptographic techniques such as digital signature and encryption and decryption based on PKI (Public Key Infrastructure) are often used to verify the authenticity of user identities and ensure the confidentiality of information. Integrity and non-repudiation of signers, etc. For PKI-based applications, the protection and security of private keys is very important. The traditional mode usually equips users with secure hardware peripherals such as USBKey and SmartCard to ensure the security of private keys. [0003] With the rapid development and application of mobile Internet and cloud computing, mobile smart terminals and "thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3066H04L9/3252
Inventor 刘婷汪宗斌
Owner 北京信安世纪科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products