Method for multi-party associated generation of SM2 digital signature

A digital signature and multi-party technology, applied in the field of information security, can solve problems such as the inability to obtain the original private key, and achieve the effect of ensuring security

Active Publication Date: 2019-03-15
WUHAN UNIV
View PDF7 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method and system for multi-party cooperative generation of SM2 digital signatures proposed in this patent can only be generated under the joint operation of multiple parties, and no party can obtain the original private key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for multi-party associated generation of SM2 digital signature
  • Method for multi-party associated generation of SM2 digital signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0032] 1. Symbols and definitions

[0033] u i : the i-th user.

[0034] x: The private key of the SM2 signature algorithm.

[0035] e: The cryptographic hash function acts on the output value of the message m.

[0036] G: A base point of an elliptic curve whose order is a prime number.

[0037] h(): A cryptographic hash function with a message digest length of v bits.

[0038] m: message to be signed.

[0039]mod n: modulo n operation. For example, 23mod7≡2.

[0040] n: the order of the base point G.

[0041] O: A special point on the elliptic curve, called infinity point or zero point, is the identity element of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for multi-party associated generation of a SM2 digital signature, which comprises the following steps: t participants generated by participating in an algorithm randomly select two numbers ui and pi in a set {1-n}, and a public key Q of the SM2 digital signature is interactively generated. The t participants randomly select ki from {1-n}; a first part r of the signature is first calculated through interaction; the t participants interactively calculate a second part s of the signature again through the r; and finally, the complete SM2 digital signature (r, s) is published. The method for multi-party associated generation of a SM2 digital signature in the invention realizes the function of multi-party associated generation of the SM2 digital signature; during signature generation, users in the set are required to participate at the same time; meanwhile, the safety and high efficiency of the signature private key are ensured.

Description

technical field [0001] The invention relates to information security technology, in particular to a method for multi-party collaborative generation of SM2 digital signatures. Background technique [0002] Digital signature is an important part of public key cryptography and plays an important role in many occasions. Typically, one party generates a digital signature that can be publicly verified by the other party. In some occasions, multiple parties need to digitally sign a document, such as some highly confidential documents, which need to be signed by multiple people. In decentralized currency transactions, such as Bitcoin transactions, multiple parties also need to sign a transaction at the same time. If the private key is stolen, it will cause direct economic losses. Therefore, multi-party collaborative digital signature has become a research hotspot. [0003] For such problems, a common solution is to divide the private key into multiple shares and send them to mult...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/0861H04L9/3066H04L9/3252
Inventor 何德彪张语荻林超冯琦王婧张佳妮
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products