A collaborative signature method and device supporting trusted display

A technology for trusted and signed messages, applied in the field of cryptography to achieve the effect of improving reliability

Active Publication Date: 2022-04-15
北京向芯力科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the access control is done at the caller, and the attacker can bypass this restriction by tampering with the caller's program to complete a complete digital signature

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A collaborative signature method and device supporting trusted display
  • A collaborative signature method and device supporting trusted display
  • A collaborative signature method and device supporting trusted display

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0053] Such as figure 1 As shown, a collaborative signature method supporting trusted display includes the following steps:

[0054] Step 11: The sub-private key D is stored in the caller 1 , securely store sub-private key D in the cooperative party 2 ;

[0055] Step 12: The caller uses the sub-private key D 1 Generate the first part of the signature Q 1 , and the messages M and Q to be signed 1 sent to the collaborating party;

[0056] Step 13: The cooperating party credibly presents the message M to be signed, and after the user verifies that the message is correct, generates the message digest e of the message M t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cooperative signature method and device supporting credible display. The method comprises the following steps: 1) initializing signature parameters to generate public parameters required in the entire signature process; 2) generating secret keys by the caller and the cooperative party ; 3) The calling party and the collaborating party cooperate to generate a public key; 4) Generate a signature. The scheme of the present invention ensures that a complete digital signature will be generated only after the user confirms the correctness of the message to be signed; at the same time, it ensures that when the data of the cooperative party is lost, due to the lack of the sub-private key stored in the caller, the attacker cannot use the cooperative party to generate Full digital signature.

Description

technical field [0001] The invention relates to cryptography technology, in particular to a collaborative signature method and device supporting credible display. Background technique [0002] Digital signature devices are widely used in e-commerce, e-government and other scenarios to provide functions such as digital signature and identity authentication. [0003] At present, the private key information is stored in the digital signature device. In order to prevent the digital signature device from digitally signing the wrong message without the user's knowledge, the existing technology proposes: the caller initiates the message according to the information to be signed sent by the digital signature requester. When requesting a digital signature, the information to be signed is displayed to the user. After the user confirms the correctness of the information to be signed and verifies the user's PIN code, the digital signature is completed and returned to the digital signatu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/0825H04L9/0861H04L9/0866H04L9/0869H04L9/3066H04L9/3247
Inventor 韩留明王庆芝
Owner 北京向芯力科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products