ECDSA digital signature method based on two-party collaboration

A technology of digital signature and signature value, applied in the field of information security, can solve problems such as breaking system security and fairness, and achieve the effect of improving security and fairness and improving performance

Active Publication Date: 2019-04-16
WUHAN UNIV
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at this kind of problem, the common solution is to adopt the threshold secret sharing scheme. However, the threshold scheme involves the key recovery process in the implementation process, and requires a trusted participant or third party to hold the complete and correct key generated by the process. private key, so that the participant or third party who holds the complete private key can complete the signature without the knowledge of other participants, which largely breaks the security and fairness of the system
In order to solve this problem, some scholars have proposed a two-party ECDSA signature with two-party collaboration and no need to recover the key. However, the existing two-party collaborative signature scheme must introduce computational overhead in order to ensure the privacy of the private key and the correctness of the signature. Very high homomorphic encryption algorithms (such as Paillier encryption) or oblivious transfer protocols with very high communication overhead, etc., which make the deployment of the algorithm in practical applications (especially devices with limited communication overhead and computing overhead) face great challenges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ECDSA digital signature method based on two-party collaboration
  • ECDSA digital signature method based on two-party collaboration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] The present invention proposes an ECDSA digital signature method based on two-party cooperation, and a specific description is given below.

[0036] Symbols and definitions:

[0037] Alice, Bob: the two parties involved in calculating the signature;

[0038] G: The base point on the ECDSA elliptic curve;

[0039] h(): cryptographic hash function;

[0040] d A , d B : The private key corresponding to the signature participants Alice and Bob;

[0041] D. A ,D B : The public keys corresponding to the signature participants Alice and Bob;

[0042] P AB : The publicly available public key used to verify the corr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an ECDSA digital signature method based on two-party collaboration. The method comprises the following steps: step 1), respectively generating corresponding signature public and private key pairs and other parameters by a signature party Alice and a signature party Bob participating in the collaborative signature; and step 2), collaboratively completing ECDSA signature by Alice and Bob, and finally outputting the signature (r,s). According to the ECDSA digital signature method based on the two-party collaboration provided by the invention, under the premise of ensuringthe security and the correctness, a signature process does not introduce high-overhead password operations such as homomorphic encryption, oblivious transfer and the like, so that a signature scheme achieves a good balance between the communication overhead and the computation overhead, and therefore the performance is remarkably superior to that of all existing ECDSA two-party collaborative digital signature methods.

Description

technical field [0001] The invention relates to information security technology, in particular to an ECDSA digital signature method based on cooperation between two parties. Background technique [0002] Digital signature is the simulation of traditional handwritten signature in digital environment, which can guarantee the unforgeability, authenticity and integrity of digital information. Usually, one party generates a digital signature, which can be publicly verified by other parties. With the development of the Internet, digital signature technology has been widely used in many fields such as finance, business, military and diplomacy. In order to reduce the risk of centralization of signature rights or loss of signature keys, some special documents (such as highly confidential documents) usually require the cooperation of multiple people to complete the signature. [0003] Aiming at this kind of problem, the common solution is to adopt the threshold secret sharing scheme....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3073H04L9/3218H04L9/3252
Inventor 何德彪王婧冯琦张语荻林超
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products