Method for generating SM9 digital signature through multi-party association under symmetrical environment

A digital signature and environmental technology, applied in the field of information security, can solve problems such as weak signature key protection, private key leakage, and reduced multi-party signature security

Active Publication Date: 2019-04-19
WUHAN UNIV
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Regarding the security of the private key, although the current threshold secret sharing scheme can divide the private key, the private key will be recovered and held by a certain party during the signature phase, resulting in the leakage of the private key. Reduced multi-signature security
[0005] 2. Regarding the fairness of signatures, in the existing thre

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating SM9 digital signature through multi-party association under symmetrical environment
  • Method for generating SM9 digital signature through multi-party association under symmetrical environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] For this scheme, when generating the SM9 digital signature, there are τ participants, expressed as In order to make the program more secure, the During the communication process, use zero-knowledge proof, such as the interactive Sigma protocol, to prove that the data sent is from the sender, reducing the risk of data forgery, and also preventing malicious parties from interfering with the joint signature process.

[0045] First, the KGC performs the following initialization operations: in the set {1,...,q-1}, the KGC randomly selects an integer ks as the master private key, and calculates Element P in pub-s =[k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for generating a SM9 digital signature through multi-party association under a symmetrical environment. The method comprises a plurality of participants, and comprisesthe following steps: a key generation center KGC generates master public and private keys; the KGC issues some private keys for all the participants; all the participants associates to sign, then, the generated signature is verified through a digital signature verification algorithm of the SM9, and if the signature passes through verification, the SM9 signature about a message M is published. With the method provided by the invention, generation of the SM9 digital signature through multi-party association is realized, each participant in a signing process is guaranteed not to expose some private keys, meanwhile, signing of the digital signature should be participated by all the participants, thus, security and fairness of multi-party signing are realized.

Description

technical field [0001] The invention relates to information security technology, in particular to a method for jointly generating SM9 digital signatures by multiple parties in a symmetrical environment. Background technique [0002] Digital signature is an important part of information security technology. Similar to the function of a physical signature or seal, a digital signature is actually a set of electronic data that only the sender can generate. It has important applications in identity authentication, data integrity, non-repudiation, and anonymity. On the one hand, the use of digital signatures can verify that the sender of the information is legal and non-repudiable, that is, entity authentication; on the other hand, it can also verify the integrity and effectiveness of the content of the sent message, that is, communication data security. In a digital signature system, the basis for identity authentication is the binding of public / private keys to the user's physic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/085H04L9/0869H04L9/3247
Inventor 何德彪冯琦王婧林超张语荻
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products