Digital signature method for secret key distributed generation

A digital signature and distributed technology, applied in the direction of digital transmission system, homomorphic encryption communication, user identity/authority verification, etc., can solve the problem of low efficiency

Active Publication Date: 2019-07-26
XIDIAN UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to overcome the inefficiency of existing digital signature methods, the present invention provides a digital signature method for key distributed generation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature method for secret key distributed generation
  • Digital signature method for secret key distributed generation
  • Digital signature method for secret key distributed generation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] Glossary:

[0093] T: Parameters of the elliptic curve secp256k1;

[0094] p: generate finite field F p A large prime number whose value is FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F=2 256 -2 32 -2 9 -2 8 -2 7 -2 6 -2 4 -1;

[0095] a, b: parameters of the ellipse equation, a=0, b=7;

[0096] G: The base point of an order n on the elliptic curve, its value is 0479BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798483ADA7726A3C4655DA4FBFC0E1108A8FD17B448A68554199C40D47D48FFB;

[0097] n: The order of the base point G of the elliptic curve, its value is FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141;

[0098] h: cofactor, control the density of selected points, its value is 01;

[0099] ID 1 : the first signing participant;

[0100] ID 2 : the second signature participant;

[0101] ID i : the i-th signature participant;

[0102] ID i+1 : the i+1th signature participant;

[0103] ID t : the tth signature p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a digital signature method for secret key distributed generation. The method is used for solving the technical problem that an existing digital signature method is low in efficiency. According to the technical scheme, in the key generation stage, t signature participants select own sub-private keys, and generation of the private keys is completed through interaction with afirst signature participant. In the signature stage, the t signature participants sequentially utilize the sub-private keys held by the t signature participants to perform distributed signature, thenthe t signature participants complete the synthesis of the second signature part under the homomorphic encryption condition, and then the first signature participant completes the final signature synthesis and verification. According to the method, a paillier homomorphic encryption algorithm is utilized; each signature participant does not need to use zero knowledge proof to ensure the correctnessof the signature, the final signature verification only needs point addition operation on one elliptic curve and point multiplication operation on two elliptic curves, and compared with t times of zero knowledge proof in the background technology, the calculation efficiency of the method is improved.

Description

technical field [0001] The invention relates to a digital signature method, in particular to a digital signature method for key distributed generation. Background technique [0002] A distributed threshold signature scheme is proposed in the document "Goldfeder S, Gennaro R, Kalodner H, et al. Securing Bitcoin wallets via a new DSA / ECDSA threshold signature scheme.2015." The main technology used in this method is paillier homomorphism Encryption algorithms and zero-knowledge proofs. In this method, the signature private key is held by t individuals, and the signature process requires the participation of t individuals, thus improving the security of the signature private key. However, this method uses a large number of zero-knowledge proof operations. Zero-knowledge proof requires multiple interactions between the verifier and the verified party. The higher the number of interactions, the higher the credibility of the verified party. This is a Time-consuming operation, so ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/00
CPCH04L9/008H04L9/3236H04L9/3252H04L9/3255
Inventor 庞辽军叩曼魏萌萌李慧贤
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products