SM9 signature cooperative generation method and system of r parameter and secret double products
A double product, digital signature technology, applied in the field of information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0083] This embodiment relates to two devices respectively labeled No. 1 and No. 2;
[0084]The No. 1 and No. 2 devices respectively store the integer secret c in the interval [1,n-1] 1 、c 2 , where n is the group G in the SM9 cryptographic algorithm 1 , G 2 , G T The order (is a prime number);
[0085] (initialization phase) precomputed with:
[0086] P A =[c -1 ]d A , where d A Identify the private key for the user's SM9, c -1 is the modulo n multiplicative inverse of c, c=(c 1 c 2 ) mod n is an integer secret that is not kept by both devices;
[0087] P B =[b]d A , where b is an integer secret that none of the m devices in the interval [1,n-1] hold;
[0088] b and c -1 Not necessarily different from each other (the two are different or the same);
[0089] g B =g ^ b, wherein ^ is exponentiation (exponentiation is carried out to the element in front of ^, and the number of times of exponentiation is behind ^), g=e(P 1 ,P pub ), P 1 for G 1 generator in ...
Embodiment 2
[0121] The difference between this embodiment and embodiment 1 is that after the calculation of T and V is completed, the No. 2 device calculates S=T-V; in the process of calculating T and V, z 2 The value is 0 or an integer constant in [1,n-1] (any integer constant, of course z 2 The value of is also a randomly selected integer in [1,n-1]).
Embodiment 3
[0123] This embodiment is implemented on the basis of embodiment 1 or embodiment 2; the difference between this embodiment and embodiment 1 or embodiment 2 is to take c 1 The value of 1 or other non-secret integers in [1,n-1], the P A It is kept as a secret by device No. 1 (of course, if P B =P A , then P B Also kept as a secret by Device No. 1); c 1 The value of is a fixed value (such as a fixed value of 1), or a non-secret integer randomly selected in [1,n-1] during the initialization phase (by No. 1 device or other devices performing initialization processing) ( remain unchanged thereafter).
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com