Generation method of two-party SM2 digital signature
A digital signature and algorithm technology, applied in the field of information security, can solve problems such as large amount of calculation, lack of mutual trust, leakage or supervision, and achieve the effect of small amount of calculation and less interaction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0186] Example 1: SM2-based certificate distribution
[0187] The present invention can be used in an SM2-based certificate distribution system. If a certificate can only be distributed when two organizations sign it together, organization A can generate a public-private key 1 , P 1 >, Institution B generates public and private keys 2 , P 2 >, they can agree that only if there is a public key [d 1 d 2 ]G-G([d 1 ]P 2 -G,[d 2 ]P 1 -G) The certificate can only be distributed when the corresponding signature is issued, then they can use the method of the invention to check out the corresponding signature. At the same time, since the private key will not be disclosed during the signing process, the private key can be used multiple times. And because of the existence of zero-knowledge proof, it can avoid the signature failure caused by a party's deliberate non-cooperation.
Embodiment 2
[0188] Example 2: Dual U-shield solution based on SM2
[0189] The present invention can be used in the dual U-shield scheme based on SM2. Assuming that an account or a certain system of a bank requires two people to authorize to access it, two U-shields can be constructed to store the private key d respectively. 1 、d 2 , it is agreed that only when there is a public key [d 1 d 2 [d 1 d 2 ] G-G corresponding signature, so as to access the system or account.
Embodiment 3
[0190] Example 3: Two-party signature of SM2-based blockchain system
[0191] The present invention can be used in an SM2-based block chain system, enabling it to support two-party signatures. Assuming that Alice and Bob jointly hold a certain property on the blockchain and require that the property can be spent only when both Alice and Bob agree, then Alice and Bob can generate a pair of public and private keys respectively 1 , P 1 > and 2 , P 2 >, Alice and Bob can deposit this asset at address [d 1 d 2 ]G-G([d 1 ]P 2 -G,[d 2 ]P 1 -G) blockchain account, when a party wants to spend this asset, he can use this invention to check out [d 1 d 2 ] G-G corresponding signature, thus spending the asset. At the same time, since the other party's own private key will not be disclosed during the signing process, this method can be used multiple times without changing the private key. Due to the existence of zero-knowledge proof, it is possible to avoid signature failure cause...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


