Key generation methods, block chain network service platform and memory medium
A network service and key generation technology, applied in the field of communication, can solve problems such as poor privacy data security, and achieve the effect of avoiding certificate query
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example
[0147] Example 1: Taking the implementation of the key generation method provided in the embodiment of the present invention based on the ECDSA and BD protocols as an example, the key generation method provided in the embodiment of the present invention will be described in detail:
[0148] Briefly introduce the ECDSA signature algorithm: (1) Signer A generates a public-private key pair (d A ,P A =d A G), where G is the base point of the elliptic curve.
[0149] (2) Signer A generates message M A The signature value of (r A ,s A ): calculate e A =H(M A ), H means for message M A Perform hash operation; generate random number k A , Calculate (x A ,y A )=[k A ]G; Let r A = X A ; Calculate
[0150] (3) Verifier B verifies message M A The signature value of (r A ,s A ): calculate e A =H(M A ); calculation Verify whether r A = X A , To judge whether the signature is valid, where r represents the commitment value in the signature result, and s represents the proof value in the signature r...
Example
[0154] Example 2: Taking the implementation of the key generation method provided in the embodiment of the present invention based on the SM2 and BD protocols as an example, the key generation method provided in the embodiment of the present invention will be described in detail:
[0155] Briefly introduce the SM2 signature algorithm: (The specific parameter values in the SM2 algorithm can refer to the algorithm flow, recommended curves and parameters in Part 2 and Part 5 of the national secret standard "SM2 Elliptic Curve Public Key Cryptographic Algorithm"):
[0156] (1) Signer A generates a public-private key pair (d A ,P A =d A G), where G is the base point of the elliptic curve.
[0157] (2) Signer A generates message M A The signature value of (r A ,s A ):make Where Z A It is the SM3 hash value of information such as identification, curve parameter, base point parameter and signer’s public key, || represents the connection of the left and right data; calculation Generate ran...
Example
[0162] Example 3: Taking the Schnorr and BD protocols to implement the key generation method provided in the embodiment of the present invention as an example, the key generation method provided in the embodiment of the present invention will be described in detail:
[0163] Briefly introduce the Schnorr signature algorithm: (1) Signer A generates a public-private key pair Where g is the group generator.
[0164] (2) Signer A uses private key x A And message m A As input, the signature value (s A ,e A ), where e A =H(r A ||m A ), s A =k A -e A x A , k A Is the random value chosen by the signer, and H is the hash function.
[0165] (3) Verifier B uses the signature value (s A ,e A ) And signer A's public key y A For input, verify that To determine whether the signature is valid.
[0166] The group key generation method based on BD protocol and Schnorr includes: (1) Participant U i The corresponding signature result is (s i ,e i ), first calculate your own temporary private key, k i =...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com