Supercharge Your Innovation With Domain-Expert AI Agents!

SM9 signature cooperative generation method and system of r parameter and secret double products

A double product, digital signature technology, applied in the field of information security

Active Publication Date: 2019-11-29
WUHAN UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the probability of this situation is extremely small, it is still possible, especially when ri is difficult to achieve a truly random selection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0083] This embodiment relates to two devices respectively labeled No. 1 and No. 2;

[0084]The No. 1 and No. 2 devices respectively store the integer secret c in the interval [1,n-1] 1 、c 2 , where n is the group G in the SM9 cryptographic algorithm 1 , G 2 , G T The order (is a prime number);

[0085] (initialization phase) precomputed with:

[0086] P A =[c -1 ]d A , where d A Identify the private key for the user's SM9, c -1 is the modulo n multiplicative inverse of c, c=(c 1 c 2 ) mod n is an integer secret that is not kept by both devices;

[0087] P B =[b]d A , where b is an integer secret that none of the m devices in the interval [1,n-1] hold;

[0088] b and c -1 Not necessarily different from each other (the two are different or the same);

[0089] g B =g ^ b, wherein ^ is exponentiation (exponentiation is carried out to the element in front of ^, and the number of times of exponentiation is behind ^), g=e(P 1 ,P pub ), P 1 for G 1 generator in ...

Embodiment 2

[0121] The difference between this embodiment and embodiment 1 is that after the calculation of T and V is completed, the No. 2 device calculates S=T-V; in the process of calculating T and V, z 2 The value is 0 or an integer constant in [1,n-1] (any integer constant, of course z 2 The value of is also a randomly selected integer in [1,n-1]).

Embodiment 3

[0123] This embodiment is implemented on the basis of embodiment 1 or embodiment 2; the difference between this embodiment and embodiment 1 or embodiment 2 is to take c 1 The value of 1 or other non-secret integers in [1,n-1], the P A It is kept as a secret by device No. 1 (of course, if P B =P A , then P B Also kept as a secret by Device No. 1); c 1 The value of is a fixed value (such as a fixed value of 1), or a non-secret integer randomly selected in [1,n-1] during the initialization phase (by No. 1 device or other devices performing initialization processing) ( remain unchanged thereafter).

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an SM9 signature cooperative generation method and system of r parameter and secret double products. The SM9 signature generation method comprises the steps that integer secrets ci in [1, n-1] are stored in a device 1 to a device m respectively, n is the order of an SM9 group, i = 1,..., m, and m is larger than or equal to 2, wherein PA = [(c1c2... Cm)-1] dA, PB = [b] dA,dA is a private key of the user, and b is an integer secret in [1, n-1]; when the message M needs to be signed by using the dA, the m devices cooperatively calculate to obtain w = gB ^ (r1r2... Rm), h=H2(M||w, n), T = [r1r2... Rm] PB + [z1 + z2 +... + zm] PZ, V = [(c1c2... Cm) h] PA + [z1 + z2 +... + zm] PZ, PZ is any non-zero element in G1, zi is an integer randomly selected by a device i in [1,n-1], and i = 1,..., m; S = T-V is calculated, wherein(h, S) is a digital signature for the message M.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to an SM9 signature collaborative generation method and system with an r parameter and a secret double product. Background technique [0002] SM9 is an identification cryptographic algorithm based on bilinear mapping (pairing operation) promulgated by the State Cryptography Administration, where the bilinear mapping (pairing operation) is: [0003] e:G 1 ×G 2 →G T , where G 1 , G 2 is the additive cyclic group, G T is a multiplicative cyclic group, G 1 , G 2 , G T The order of is a prime number n (Note: In the SM9 specification, G 1 , G 2 , G T The order used is a capital letter N, and this patent application uses a lowercase n), that is, if P and Q are G respectively 1 , G 2 element in, R is G 1 or G 2 element in , then e(P,Q) is G T elements in , and: [0004] e(P+R,Q)=e(P,Q)e(R,Q), [0005] e(P,Q+R)=e(P,Q)e(P,R), [0006] e(aP,bQ)=e(P,Q) ab . [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/085H04L9/3247
Inventor 龙毅宏
Owner WUHAN UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More