Method and system for collaborative generation of numbers containing secrets based on secret dynamic sharing
A dynamic sharing and secret technology, applied in the field of cryptography, can solve the problems of complex collaborative computing process, difficult calculation results, and difficult secrets.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0094] This embodiment relates to secret dynamic sharing method 1 of the present invention. This embodiment includes two devices called the first device and the second device; in this embodiment, d is an integer secret that is unknown to both devices in the interval [1,n-1] and needs to be shared (shared) , n is a prime number; pre-calculated with c=E((a 1 d) mod n), where E( ) represents the encryption operation of additive homomorphic encryption using the homomorphic encryption public key of the second device, a 1 is an integer in the interval [1,n-1]; here, a 1 is the secret of the first device or is not the secret of the first device; if a 1 If it is not a secret belonging to the first device in the interval [1,n-1], then c is saved by the first device as a secret;
[0095] The two devices of this embodiment are cooperatively calculated as follows to obtain the satisfying relation d 0 (d 1 +d 2 Integer secret d of )modn=d 0 、d 1 、d 2 , where d 0 is an integer sec...
Embodiment 2
[0111] Embodiment 2 is based on Embodiment 1 and implements method 1 of collaborative generation of numbers including secrets of the present invention.
[0112] On the basis of Embodiment 1, the first device has an integer secret w randomly selected in [1,n-1] 1, or have an integer secret w computed from randomly selected integer secrets in [1,n-1] 1 ;The second device has an integer secret w randomly selected in [1,n-1] 2 , or have an integer secret w computed from randomly selected integer secrets in [1,n-1] 2 ; The two devices cooperatively generate a , containing the secret w, as follows: 1 、w 2 and the number of d u=(w 1 w 2 (z+rd))mod n, where z and r are non-secret integers in [1,n-1]:
[0113] First, the two devices calculate the integer secret d according to the secret dynamic sharing method one 0 、d 1 、d 2 ;
[0114] Afterwards, the first means calculates u 1 =((d 0 ) -1 z+rd 1 ) mod n,w 0 =(d 0 w 1 ) mod n, where (d 0 ) -1 is d 0 The modulo n mul...
Embodiment 3
[0126] The difference between this embodiment and embodiment 2 is that u=(w is calculated by the first device 0 u 2 ) mod n (of course w 0 not disclosed), and the first device does not disclose the calculated u, and at w 1 When is an integer constant, d cannot be calculated from the public data calculated by u, and the confidential data calculated by d cannot be calculated from the public data calculated by u. Therefore, in this embodiment, w 1 The value is an integer constant; here w 1 is an integer constant including w 1 is a secret integer constant or a non-secret integer constant (where the non-secret integer constant includes the case of the constant 1).
[0127] A specific application of this embodiment is to realize collaborative generation of SM9 signature private key based on secret sharing.
[0128] At this time, two private key generators, the first and second private key generators, respectively correspond to the first and second devices of the present inventi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com