A threshold signature method based on sm2 signature algorithm
A threshold and algorithm technology, applied in the field of threshold signatures, can solve problems such as the inability to verify the validity of signatures and the inability to determine dishonest users, and achieve a wide range of applications
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0013] The threshold signature based on the SM2 signature algorithm proposed by this method includes three stages: a system establishment stage, a signature stage, and a signature verification stage.
[0014] In this approach, techniques from the following three literatures are cited to construct our scheme.
[0015] Citing the literature "C.Hazay, G.L.Mikkelsen, T.Rabin, T.Toft.and A.A.Nicolosi: Efficient RSA keygeneration and threshold Paillier in the two-party setting." The key generation method of the threshold homomorphic encryption scheme generates the threshold Homomorphic encryption scheme user private key and scheme public key, and quote the threshold encryption and decryption algorithm in this document as the encryption algorithm E and D in this scheme; in this method, the notation in the document is quoted, × E Represents homomorphic multiplication.
[0016] The commitment algorithm and Commitment verification algorithm is used as Com algorithm and Ver algorithm i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

