Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Signature method, device and system based on secure multi-party computing

A technology of secure multi-party computing and signature device, applied in the field of information security, can solve problems such as great security, inability to guarantee asset security, etc., to achieve the effect of improving transaction security, solving the loss or theft of private keys, and solving security risks

Active Publication Date: 2019-06-25
JUZIX TECH SHENZHEN CO LTD
View PDF8 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this scheme can largely alleviate the security problem of a single key being lost or stolen, in an extreme situation: when both personal and institutional keys are stolen, the security of assets cannot be guaranteed
It can be seen that the existing widely used asymmetric key schemes still have great security problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature method, device and system based on secure multi-party computing
  • Signature method, device and system based on secure multi-party computing
  • Signature method, device and system based on secure multi-party computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments in this specification, not all of them. Based on one or more embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of the embodiments of this specification.

[0056] At present, in digital asset management and asset transactions, the dynamic signature method based on secure multi-party computing is to divide the private key in the asymmetric key into two pieces, one piece is kept by the organization, and one piece is kept by the user. Complete the transaction process. Although this sche...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a signature method, device and system based on secure multi-party computing. The method comprises the following steps: obtaining transaction data, and generating a transaction hash from the transaction data by utilizing a preset rule; determining the signature level of the transaction data according to the relationship between the transaction limit and a first threshold value in the transaction data; determining a signature mechanism based on the signature level, the signature mechanism being a trusted mechanism for signing the transaction data; basedon the private key fragment stored by the determined signature mechanism and the private key fragment stored by the client, obtaining a signature file; wherein the transaction hash is signed and authenticated based on secure multi-party computing, private key fragments are stored in the trusted institution and the client respectively, and the private key fragments are composed of part of sub private keys generated based on segmentation of an asymmetric key. By utilizing the embodiment of the invention, the potential safety hazard of private key loss or stealing can be effectively solved, and the transaction security is greatly improved.

Description

technical field [0001] The embodiment solutions of this specification belong to the field of information security technology, and in particular relate to a signature method, device and system based on secure multi-party computation. Background technique [0002] Secure Multi-Party Computation (MPC) is a collaborative computing problem that solves the problem of privacy protection among a group of mutually distrusting parties. It can be abstractly understood as: each participant has its own private data, and calculates the public function without leaking its own private data, and when the calculation of the entire function is completed, each participant only knows the calculation result and does not know other The data of the parties and the intermediate data of the calculation process. It can be seen that applying secure multi-party computing to asset transaction security and the management of future digital assets plays an important role. [0003] At present, in digital a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q40/04
Inventor 唐虹刚谢翔孙立林
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products