Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for client to generate keys for multiple clients and a single server

A technology for generating keys and clients, applied in the field of information security, can solve the problems of increasing the burden on the key server, low flexibility, and no solutions, and achieve the effect of improving security and flexibility

Active Publication Date: 2022-07-05
JUZIX TECH SHENZHEN CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, for the key service system, generally a key server generates the key, and then distributes the generated key to the key user, which will inevitably increase the burden on the key server, and because a single Generated by the key server, all key generation rules are specified and maintained by the key server itself, and the flexibility is not high
[0003] For the above-mentioned problems existing in the existing key system, no effective solution has been proposed yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for client to generate keys for multiple clients and a single server
  • Method and device for client to generate keys for multiple clients and a single server
  • Method and device for client to generate keys for multiple clients and a single server

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0122] In this example, a key management method is provided in which a key is generated by a client based on secure two-party computing, and a server is kept by multiple clients. Specifically, a single client generates a private key and splits it into multiple The components are distributed to multiple clients and a single server respectively, and the two-party MPC uses multiple clients and servers to calculate the signature, and refresh the multiple client and server components by backing up the private key.

[0123] Based on this, operations such as key generation, use, storage, backup, recovery, and refresh in the key management system can be performed as follows:

[0124] 1) Generate

[0125] like image 3 shown, may include the following steps:

[0126] S1: The client and the key server complete the two-way authentication through KYC, and issue the authentication materials to complete the registration process;

[0127] S2: Client 1 generates a complete private key SK, ...

example 2

[0160] In this example, a key management method is provided based on secure multi-party computing to generate a key through a client and a server to multiple clients to keep it. Specifically, a single client generates a private key and splits it into multiple components They are distributed to multiple clients and key servers respectively, use multiple clients and servers to calculate signatures through MPC, refresh the key server and multiple client components through the client’s backup private key, and refresh multiple clients and multiple client components through MPC. key server component.

[0161] Based on this, operations such as key generation, use, storage, backup, recovery, and refresh in the key management system can be performed as follows:

[0162] 1) Generate

[0163] like Figure 8 shown, may include the following steps:

[0164] S1: The client and the key server complete the two-way authentication through KYC, and issue the authentication materials to comple...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a method and device for a client to generate keys for multiple clients and a single server, which is applied to a key management system. The key management system includes: N clients and a key server, wherein, N is a positive integer greater than or equal to 2, and the above method includes: a first client generates a complete target private key, and generates a target public key according to the target private key, wherein the first client is the N clients One of the clients; the first client splits the target private key into N+1 key components; the first client splits the N+1 key components through a secure channel and the target components are sent to the N clients and the key server in a one-to-one correspondence. Through the above method, the problems of low security and flexibility existing in the existing key management system are solved, and the technical effect of effectively improving the security and flexibility of key management is achieved.

Description

technical field [0001] The present application belongs to the technical field of information security, and in particular, relates to a method and device for a client to generate keys for multiple clients and a single server. Background technique [0002] At present, for the key service system, a key server is generally used to generate keys, and then distribute the generated keys to key users, which will inevitably increase the burden on the key server, and because a single key server is used to generate keys. Generated by the key server, all the key generation rules are specified and maintained by the key server itself, and the flexibility is not high. [0003] For the above problems existing in the existing key system, no effective solution has been proposed yet. SUMMARY OF THE INVENTION [0004] The purpose of this application is to provide a method and device for a client to generate keys for multiple clients and a single server, which can effectively improve the secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/40
Inventor 颜泽谢翔傅志敬孙立林
Owner JUZIX TECH SHENZHEN CO LTD