Supercharge Your Innovation With Domain-Expert AI Agents!

SM9 signature private key generation and digital signature method, system and device

A private key and generating element technology, applied in the field of cryptography, can solve the problems that digital signatures cannot achieve non-repudiation

Active Publication Date: 2020-04-24
WUHAN UNIV OF TECH
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0027] The purpose of the present invention is to propose a corresponding solution to the problem that the current identification-based digital signature cannot realize non-repudiation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM9 signature private key generation and digital signature method, system and device
  • SM9 signature private key generation and digital signature method, system and device
  • SM9 signature private key generation and digital signature method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] Embodiment 1 relates to the implementation of the SM9 signature private key generation method, digital signature method and signature verification method of the present invention.

[0079] The implementation of the SM9 signature private key generation method involves a bilinear mapping (pairing operation) e:G 1 ×G 2 →G T ;Group G 1 The generator of is P 1 , group G 2 The generator of is P 2 ;Group G 1 , G 2 , G T The order of is a prime number n;

[0080] The implementation involves the identification private key generation server (Private Key Generation Server) of the server and the identification private key generation client (Private Key Generation Client) of the user end;

[0081] The identification private key generation server has the system master key s in [1,n-1] m (or system master private key s m ); m There is a corresponding system master public key P pub =[s m ]P 2 , with the corresponding system auxiliary public key P Fpub =[s m ]P 1 ;

...

Embodiment 2

[0122] The difference between this embodiment and embodiment 1 is:

[0123] The identity private key generation client does not randomly select an integer in [1,n-1] as the user master key s U (or user master private key s U ), do not calculate G 1 element P in U1 =[s U ]P 1 , do not calculate G 2 element P in U2f =[(s U ) -1 ]P 2 , where (s U ) -1 is s U The modulo n multiplicative inverse of ;

[0124] The SM9 identification private key d corresponding to the user identification used for signing is generated collaboratively A and P U2 , the server’s identity private key generation server randomly selects an integer s in [1,n-1] U0 , the client’s identity private key generation client randomly selects an integer s in [1,n-1] U1 ;

[0125] The identity private key generation client and the identity private key generation server use s=(s m +s U0 +s U1 ) mod n as the master key (master private key), without revealing their respective secrets, through interact...

Embodiment 3

[0136] The difference between this embodiment and embodiment 1 is:

[0137] The identity private key generation client does not randomly select an integer in [1,n-1] as the user master key s U (or user master private key s U ), do not calculate G 1 element P in U1 =[s U ]P 1 , do not calculate G 2 element P in U2f =[(s U ) -1 ]P 2 , where (s U ) -1 is s U The modulo n multiplicative inverse of ;

[0138] In collaboratively generating the identity private key d corresponding to the user identity A and P U2 , the server’s identity private key generation server randomly selects an integer s in [1,n-1] U0 , the client’s identity private key generation client randomly selects an integer s in [1,n-1] U1 ;

[0139] The identity private key generation client and the identity private key generation server use s=(s m +s U0 the s U1 ) modn is the master key (master private key), without revealing their respective secrets, the SM9 identification private key d for signa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an SM9 signature private key generation and digital signature method, system and device. P1 and P2 are respectively generators of groups G1 and G2 in an SM9 algorithm, and n is the order of the group. A private key generation server is provided with a system master key sm, Ppub = [sm] P2 and PFpub = [sm] P1.A client has a user master key sU, PU1 = [sU] P1, and PU2f = [(sU)-1] P2; the client and the server cooperatively generate an SM9 signature private key dA and PU2 = [(sm + sU)-1] Ppub of the user by taking s = sm + sU as a main secret key, and the server cannot obtain the dA. A signature party takes P1 as a generator of the group G1, Ppub as a main public key and dA as a private key, and generates a digital signature (h, S) of a message by adopting an SM9 signature algorithm; the signature verifier verifies that e (PU1, PU2f) is equal to e (P1, P2); and after e (PU1 + PFpub, PU2) is equal to e (P1, Ppub), the P1 is used as a generator of the group G1, the PU2 is used as a generator of the group G2, the Ppub is used as a main public key, and the effectiveness of the digital signature (h, S) of the message is verified by adopting an SM9 signature algorithm.

Description

technical field [0001] The invention belongs to the technical field of cryptography, in particular to a two-line mapping-based SM9 signature private key generation method and digital signature method, system and device with non-repudiation capability. Background technique [0002] Compared with PKI (Public Key Infrastructure) which uses digital certificate technology, identity-based cryptography (Identity Based Cryptography, IBC) saves the troublesome link of obtaining the public key digital certificate of the private key owner, and the technical implementation is simple. It has been paid more and more attention by people and has broad application prospects. [0003] Identity-based ciphers can be used for both data encryption (called Identity Based Encryption, IBE) and digital signatures (called Identity Based Signature, IBS). At present, most identification-based cryptographic algorithms use algorithms based on bilinear mapping (bilinear mapping, also known as pairing oper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32
CPCH04L9/0631H04L9/0866H04L9/3247
Inventor 龙毅宏
Owner WUHAN UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More