Threshold digital signature method and system
A digital signature and threshold technology, applied in the field of encryption currency and cryptography, threshold cryptography, ECDSA, elliptic curve cryptography, to achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0129] Since embodiments of the present invention use ECC to encrypt secret information that needs to be sent between participants based on a hierarchical derivation, for example as disclosed in International Patent Publication WO 2017 / 145016, all messages are organized to be sent to all It is both possible and sensible to enable authentication against potentially threatened or hostile actors, if necessary, within a single packet of the consumer.
[0130] Signature generation is performed by coordinating participant p (c) proposed. By default, any key slice can act as a coordinating participant, and the requirements boil down to individual implementations of the protocol. The algorithm used is documented below, and details about its deployment are provided in a later section.
[0131] Algorithm 1 key generation
[0132] Domain parameters (curve, base n, generator G)
[0133] Input: N / A
[0134] Output: public key Q A
[0135] private key share share d A(1) , d A(2) ,....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



