Method and device for client to generate keys for multiple clients and a single server
A technology for generating keys and clients, applied in the field of information security, can solve the problems of increasing the burden on the key server, low flexibility, and no solutions, and achieve the effect of improving security and flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0122] In this example, a key management method is provided in which a key is generated by a client based on secure two-party computing, and a server is kept by multiple clients. Specifically, a single client generates a private key and splits it into multiple The components are distributed to multiple clients and a single server respectively, and the two-party MPC uses multiple clients and servers to calculate the signature, and refresh the multiple client and server components by backing up the private key.
[0123] Based on this, operations such as key generation, use, storage, backup, recovery, and refresh in the key management system can be performed as follows:
[0124] 1) Generate
[0125] like image 3 shown, may include the following steps:
[0126] S1: The client and the key server complete the two-way authentication through KYC, and issue the authentication materials to complete the registration process;
[0127] S2: Client 1 generates a complete private key SK, ...
example 2
[0160] In this example, a key management method is provided based on secure multi-party computing to generate a key through a client and a server to multiple clients to keep it. Specifically, a single client generates a private key and splits it into multiple components They are distributed to multiple clients and key servers respectively, use multiple clients and servers to calculate signatures through MPC, refresh the key server and multiple client components through the client’s backup private key, and refresh multiple clients and multiple client components through MPC. key server component.
[0161] Based on this, operations such as key generation, use, storage, backup, recovery, and refresh in the key management system can be performed as follows:
[0162] 1) Generate
[0163] like Figure 8 shown, may include the following steps:
[0164] S1: The client and the key server complete the two-way authentication through KYC, and issue the authentication materials to comple...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


