Method for jointly generating SM2 digital signature by multiple parties

A digital signature and multi-party technology, applied in the field of information security, can solve problems such as the inability to obtain private keys

Active Publication Date: 2019-03-29
WUHAN UNIV
View PDF9 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method and system for multi-party joint generation of SM2 digital signature proposed in this patent can only be generated under the joint operation of all participants, and no one party can obtain the original private key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for jointly generating SM2 digital signature by multiple parties
  • Method for jointly generating SM2 digital signature by multiple parties

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] like figure 1 As shown, the present invention proposes a scheme for multiple parties to jointly generate SM2 digital signatures, and a specific description is given below.

[0045] In the following description of the scheme of the present invention, if P, Q are elements (points) in the elliptic curve group, then P+Q, P-Q represent P, point addition and subtraction operations of Q respectively, and k P represents k elliptic curves The point addition of point P, that is, P+P+...+P (a total of k P); ellipsis "..." means multiple data items of the same (type) or multiple same operations; Represents an integer field of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for jointly generating SM2 digital signature by multiple parties. The method comprises following steps that all parties P1, P2, ... , P<Tau> joining digital signaturerandomly select partial private keys x1, x2, ... , x<x>(belonging to Zn), and two partial random numbers k1, k2, ... , k<x>(belonging to Zn) and Rho1, Rho2, ... , Rho<x>(belonging to Zn); then all parties calculate through an interactive ideal function F<MULT> to obtain a public key P<pub>=(Q-G)=(Sigma<lota=1><Tau>x<lota>G-G) of SM2, and two intermediate variables R=Sigma<lota=1><Tau>k<lota>G=(r<x>,r<y>) and alpha =xRhomode n; for a message m, all parties separately calculate a hash value e=h(m) and a first signature r=r<x>+e mod n, and calculates through the interactive ideal function F<MULT>to obtain a third intermediate variable beta=Rho(k+r)mod n; and finally, all parties separately calculate a second signature s=min{alpha<-1>beta-r, n-alpha<-1>beta+r}, and outputs complete SM2 digital signature (r,s) after signature verification succeeds. Through adoption of the method, an SM2 digital signature is generated by multiple parties jointly, it is ensured that all parties do not disclose partial private keys in signing, and digital signature involves all parties, so that multi-party signature is safe and fair.

Description

technical field [0001] The invention relates to information security technology, in particular to a method for jointly generating SM2 digital signatures by multiple parties. Background technique [0002] Digital signature is an important part of public key cryptography and plays an important role in many occasions. Generally speaking, each user has a pair of keys, namely (private key, public key). Digital signatures are generated with the user's private key and can be verified using the public key. However, with the development of the Internet, many businesses are carried out on the Internet, such as e-commerce, electronic securities and so on. The completion of these electronic transactions usually involves several participants, and each participant needs to sign the relevant messages at the same time. The security and fairness requirements among participants have led to the research on multi-party digital signature systems. [0003] For such problems, a more common solu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/0861H04L9/3066H04L9/3252
Inventor 何德彪冯琦王婧林超张语荻张佳妮
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products