Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An sm2 homomorphic signature method based on sotp technology to multiply and encrypt private keys

A private key and technical technology, which is applied in homomorphic encryption communication, digital transmission system, user identity/authority verification, etc., can solve the problem of SM2 standard algorithm incompatibility, achieve good compatibility and portability, and enhance attack Ability, the effect of enhancing the ability to resist attacks

Active Publication Date: 2022-07-12
南京壹证通信息科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Existing problem 1: The standard SM2 signature process steps and signature verification steps have been changed, which is incompatible with the SM2 standard algorithm
[0007] Problem 2: A third-party attacker has obtained the intermediate result of the stored private key, and can generate any legal signature by using the signature process in the scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An sm2 homomorphic signature method based on sotp technology to multiply and encrypt private keys
  • An sm2 homomorphic signature method based on sotp technology to multiply and encrypt private keys
  • An sm2 homomorphic signature method based on sotp technology to multiply and encrypt private keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.

[0037] The SOTP algorithm ensures that different users have different encryption and decryption algorithms. It organically integrates the cryptographic algorithm with the user's key based on mathematical principles, and uses the user's key to reconstruct the original common algorithm, so that different users use different encryption and decryption algorithms, and the user's key is integrated into its own algorithm.

[0038] registration process

[0039] At the initial stage of use, the user must register with the server in a secure environment to complete the initialization operation. The client U provides the user identification uid, the user password feature P, and the device identification code M; the server generates a random key for U—the user key k, and injects k into the SOTP algorithm generator E to generate an encryption relat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SM2 homomorphic signature method based on SOTP technology for multiplying and encrypting a private key. The user's private key is encrypted based on modulo multiplication and then stored in the client, and the client can periodically update the private key by modulo encryption. Private key ciphertext, you do not need to decrypt the private key ciphertext when signing, you can directly use the ciphertext private key for signature; when the client performs the signature operation, the latest signature private key ciphertext is used for the signature operation. When verifying the signature, the signature verification service center receives the user uid, the timestamp T when the ciphertext of the signature private key is generated, the public key certificate, the signature value, and the signature data. Use the SOTP algorithm to recover the random number u used in the modulo multiplication encryption of the corresponding user's private key, use the random number and the original public key to multiply the point calculation to obtain the signature verification public key, and use the signature verification public key to verify whether the signature is legal. In the present invention, the private key protection can be substantially integrated with simple memory-based protection measures such as passwords, so as to enhance the ability to resist attacks such as device embezzlement, and has good portability.

Description

technical field [0001] The invention belongs to the fields of information security and data business, and in particular, the invention relates to an SM2 homomorphic signature method based on SOTP technology for multiplying and encrypting a private key. Background technique [0002] Existing SM2 private key protection methods: [0003] Instead of storing the original text of the signature private key, store the mixed result of the private key and pre-generated random numbers, and use the stored private key modulo multiplication result to generate the signature. For example, the invention patent with publication number CN201810133887.X discloses a method for implementing SM2 white-box ciphers. The patent proposes a scheme for encrypted storage of private keys, but does not solve the problem of preventing signature forgery after the stored ciphertext private key is stolen. . [0004] Analysis of existing technical solutions: [0005] The existing SM2 private key protection s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/00H04L9/40
CPCH04L9/3247H04L9/008H04L63/0442
Inventor 王杰勋唐天其马圣东
Owner 南京壹证通信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products