User private key generation method and system, readable storage medium and electronic equipment

A technology of key generation and key generation center, applied in the field of information security, can solve the problems of security threats, leakage of cryptographic systems, and difficulty in meeting the compliance of cryptographic applications, so as to improve system security and avoid leakage.

Active Publication Date: 2019-08-23
成都卫士通信息产业股份有限公司
View PDF17 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above-mentioned related technologies are difficult to meet the compliance in cryptographic applications (that is, the electronic signature method requires that only the user owns the user's private

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User private key generation method and system, readable storage medium and electronic equipment
  • User private key generation method and system, readable storage medium and electronic equipment
  • User private key generation method and system, readable storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the drawings in the embodiments of the present disclosure. Obviously, the described embodiments It is a part of the embodiments of the present disclosure, but not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present disclosure.

[0044] In the SM9 encryption algorithm, the key generation center is used to generate and distribute private keys (that is, user private keys) for system users. However, due to the inherent defects in the key generation process of the traditional SM9 encryption algorithm, a single key generation center generates and distributes private ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user private key generation method, a user private key generation system, a computer readable storage medium and electronic equipment. The user private key generation methodcomprises the steps that when a private key request sent by a user side is received, a random mask point calculated by the user side through a first random number is acquired; and the main private keys of the M key generation centers and the random mask point are utilized to execute a secret state operation so as to obtain a mask private key, thereby enabling the user side to demask the mask private key so as to obtain the user private key. According to the method, user private key leakage can be avoided, and the system security is improved.

Description

technical field [0001] The present disclosure relates to the technical field of information security, and in particular to a method and system for generating a user private key, a computer-readable storage medium, and an electronic device. Background technique [0002] National Commercial Cryptography Standard Algorithm SM9 is an identity-based cryptographic algorithm, including four mechanisms: digital signature, key exchange, key encapsulation, and public key encryption. In the SM9 algorithm, the user's identity (such as: ID number, mobile phone number, and email address, etc.) can be used as the user's public key, and there is no need for the certificate center in the traditional public key cryptography system to distribute certificates to users to ensure that the user's public key The binding with the user identity reduces the cumbersome certificate management mechanism. [0003] In related technologies, SM9's key generation center KGC holds the master private key of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/0869H04L9/083H04L9/0825H04L9/008
Inventor 涂彬彬王现方张立廷
Owner 成都卫士通信息产业股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products