Unlock instant, AI-driven research and patent intelligence for your innovation.

A threshold signature method based on sm2 signature algorithm

A threshold and algorithm technology, applied in the field of threshold signatures, can solve problems such as the inability to verify the validity of signatures and the inability to determine dishonest users, and achieve a wide range of applications

Active Publication Date: 2021-06-18
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this algorithm has the following limitations: (1) The total number of group members n must be at least greater than or equal to 2t+1
Therefore, it is not suitable for blockchain signature scenarios such as (2, 3), (2, 2)
(2) The validity of the signature given by each user in the group cannot be verified, and can only be verified by the final result
If the signature result is incorrect, the dishonest user cannot be identified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A threshold signature method based on sm2 signature algorithm
  • A threshold signature method based on sm2 signature algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The threshold signature based on the SM2 signature algorithm proposed by this method includes three stages: a system establishment stage, a signature stage, and a signature verification stage.

[0014] In this approach, techniques from the following three literatures are cited to construct our scheme.

[0015] Citing the literature "C.Hazay, G.L.Mikkelsen, T.Rabin, T.Toft.and A.A.Nicolosi: Efficient RSA keygeneration and threshold Paillier in the two-party setting." The key generation method of the threshold homomorphic encryption scheme generates the threshold Homomorphic encryption scheme user private key and scheme public key, and quote the threshold encryption and decryption algorithm in this document as the encryption algorithm E and D in this scheme; in this method, the notation in the document is quoted, × E Represents homomorphic multiplication.

[0016] The commitment algorithm and Commitment verification algorithm is used as Com algorithm and Ver algorithm i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a threshold signature method based on the SM2 signature algorithm, including a system establishment stage, a signature stage and a signature verification stage, wherein: in the system establishment stage, a plurality of participating users jointly generate a DSA key pair (x, y= g x ), where y is a public value, and x is shared between users; in the signature generation stage, the DSA signature algorithm is used, and the random number k in the DSA signature is jointly generated by n users, and then jointly calculated by the nature of homomorphic encryption Get the encrypted value of the DSA signature, and finally decrypt the value to generate the signature of the message digest. The invention proposes a new threshold signature method based on the sm2 algorithm. In the method, the total member number n only needs to be greater than or equal to t+1, and the intermediate results of each step output by the user can be verified. Therefore, the threshold signature method proposed by Shang Ming et al. proposes a threshold signature scheme that is more flexible and has a wider application range.

Description

technical field [0001] The invention relates to a threshold signature method based on SM2 signature algorithm. Background technique [0002] The State Cryptography Administration released the SM2 elliptic curve public key cryptography algorithm on December 17, 2010. The SM2 algorithm is designed to ensure the security of various information systems, and is of great significance to the construction of commercial encryption products and information security systems in my country. Among them, SM2 elliptic curve public key cryptographic algorithm includes digital signature algorithm, key exchange protocol and public key encryption algorithm. [0003] In common signature algorithms, the private key is only held by one user. If the user's private key is stolen by an attacker, the attacker can forge the signature. In order to avoid this risk, Desmedt et al. proposed the idea of ​​threshold signature. In threshold signature, the private key is shared by a group consisting of n u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0863H04L9/0869H04L9/3247
Inventor 范佳白健安红章王震
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP