Supercharge Your Innovation With Domain-Expert AI Agents!

Key management method and electronic device for each server generating key components

A technology for generating keys and servers, which is applied in the field of data security, can solve problems such as increasing the burden on key servers, no solution is proposed, and low flexibility, so as to achieve the effect of improving security and flexibility

Active Publication Date: 2021-09-21
JUZIX TECH SHENZHEN CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, for the key service system, generally a key server generates the key, and then distributes the generated key to the key user, which will inevitably increase the burden on the key server, and because a single Generated by the key server, all key generation rules are specified and maintained by the key server itself, and the flexibility is not high
[0003] For the above-mentioned problems existing in the existing key system, no effective solution has been proposed yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method and electronic device for each server generating key components
  • Key management method and electronic device for each server generating key components
  • Key management method and electronic device for each server generating key components

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0129] In this example, a key management method based on secure two-party computing that is generated and stored by multiple servers is provided, a key management scheme based on secure multi-party computing is applied to key generation, Use, store, backup, restore, refresh and other operations.

[0130] Specifically, different servers independently generate key components, and finally use the two-party MPC to generate the public key; through the two-party MPC, use the server to calculate the signature. Operations such as key generation, use, storage, backup, recovery, and refresh in this situation are explained as follows:

[0131] 1) generate:

[0132] Such as image 3 As shown, the following steps may be included:

[0133] S1: The client and the key server complete two-way authentication through KYC, and issue authentication materials to complete the registration process;

[0134] S2: Key servers 1~n generate key components SK1~n locally respectively;

[0135] S3: The ...

example 2

[0174] In this example, a key management method based on secure multi-party computing that is generated and stored by multiple servers is provided, a key management scheme based on secure multi-party computing is applied to the key generation and use of the key management system , storage, backup, restore, refresh and other operations.

[0175] Specifically, without client participation, multiple servers respectively generate private key components to obtain public keys through MPC, through MPC, multiple servers calculate signatures, and perform MPC calculations through private key components to refresh multiple server components. Operations such as key generation, use, storage, backup, recovery, and refresh in this situation are explained as follows:

[0176] 1) generate

[0177] Such as Figure 8 As shown, the following steps may be included:

[0178] S1: The client and the key server complete two-way authentication through KYC, and issue authentication materials to compl...

example 3

[0211] In this example, a key management method based on secure multi-party computing is provided that is generated and kept by multiple servers and one client, a key management scheme based on secure multi-party computing, and the key used in the key management system Create, use, store, backup, restore, refresh, etc.

[0212] Specifically, one client and multiple servers respectively generate private key components to obtain the public key through MPC, use the client and multiple servers to calculate signatures through MPC, and perform MPC calculations to refresh the client and multiple services through the private key components end weight. Operations such as key generation, use, storage, backup, recovery, and refresh in this situation are explained as follows:

[0213] 1) generate:

[0214] Such as Figure 13 As shown, the following steps may be included:

[0215] S1: The client and the key server complete two-way authentication through KYC, and issue authentication ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application provides a key management method and electronic equipment for each server to generate key components, which are applied in a key system. The key system includes: a client and N key servers, where N is greater than or equal to is an integer of 2, the method includes: the N key servers receive the key generation request sent by the client; each key server in the N key servers responds to the clients key generation request Request, respectively generate their corresponding key components locally to obtain N key components; the N key servers calculate the target private key according to the N key components, and calculate the target public key through the target private key key. The above-mentioned solution solves the technical problem of low security and flexibility existing in the existing key system that generates keys only through one key server, and achieves the goal of effectively improving the security and flexibility of the key system technical effect.

Description

technical field [0001] The present application belongs to the technical field of data security, and in particular relates to a key management method and electronic equipment in which servers generate key components respectively. Background technique [0002] At present, for the key service system, generally a key server generates the key, and then distributes the generated key to the key user, which will inevitably increase the burden on the key server, and because a single Generated by the key server, all key generation rules are specified and maintained by the key server itself, and the flexibility is not high. [0003] For the above-mentioned problems existing in the existing key system, no effective solution has been proposed yet. Contents of the invention [0004] The purpose of this application is to provide a key management method and electronic equipment for each server to generate key components, which can achieve the technical effect of improving the key securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04L9/32
Inventor 颜泽谢翔傅志敬孙立林
Owner JUZIX TECH SHENZHEN CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More