Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Active and safe SM2 digital signature two-party generation method

A digital signature and active security technology, which is applied to the public key of secure communication, digital transmission system, secure communication device, etc. It can solve the problems of only considering security, high communication and calculation costs, and unforgeable security of signature schemes. , to achieve the effects of enhanced security, low calculation cost, and low communication cost

Active Publication Date: 2020-07-24
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the SM2 digital signature algorithm, there are several threshold digital signature schemes, but there are many shortcomings: some two-party digital signature protocols only consider the security against passive adversaries, and it is difficult to resist the signature private key security and signature under active attacks. The existence of the scheme cannot forge the security; there are also some threshold signature schemes with high interaction complexity and high communication and calculation costs, which do not meet the needs of real-world applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active and safe SM2 digital signature two-party generation method
  • Active and safe SM2 digital signature two-party generation method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0024] 1. Participant P 1 with P 2 Jointly generate the key of the SM2 digital signature algorithm as follows

[0025] Step 1: P 1 Choose a random number d between [1,n-1] 1 , to calculate the partial public key Y 1 = d 1 ·G.

[0026] Step 2: P 2 Choose a random number d between [1,n-1] 2 , to calculate the partial public key Y 2 = d 2 ·G.

[0027] Step 3: P 1 Will Y 1 send to P 2 .

[0028] Step 4: P 2 check if Y 1 =O, the agreement is terminated.

[0029] Step 5: P 2 Calculate Y=d 2 ·Y 1 -G, if Y=O, then P 2 Return to step 2; otherwise, output Y as the user's public key.

[0030] Step 6: P 2 Will Y 2 send to P 1 .

[0031] Step 7: P 1 Calculate Y'=d 1 ·Y 2 -G, if Y'≠Y or Y'=O, then P 1 terminate the agreement; otherwise, P 1 Store Y as the public key of the SM2 signature algorithm.

[0032] 2. Participant P 1 with P 2 Actively update some private keys of the SM2 digital signature algorithm as follows.

[0033] Step 8: P 1 Choose a random nu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an active and safe SM2 digital signature two-party generation method. The method comprises the following steps: 1) enabling a participant P1 to generate and store a part of private key d1, enabling a participant P2 to generate and store a part of private key d2, and enabling the P1 and the P2 to generate a user public key Y; 2) randomly generating a temporary private key k1by the P1, calculating a temporary public key R1=k1*G, and sending the R1 to the P2; 3) randomly generating temporary private keys k21 and k22 by P2, calculating temporary public keys R21=k21*G and R22=k22*G, and sending the temporary public keys R21=k21*G and R22=k22*G to P1; 4) respectively calculating a common evidence value R by P1 and P2 according to respective temporary private keys; 5) enabling the P2 to calculate partial signatures s1 and s2 of the message m according to the k21, the k22, the d2 and the R and send the partial signatures s1 and s2 to the P1, and 6) enabling the P1 to generate the complete signature of the message m according to the s1, the s2, the d1, the k1 and the R and verify the validity of the complete signature, and if the verification succeeds, outputting the complete signature.

Description

technical field [0001] The invention relates to an active and safe SM2 digital signature two-party generation method, which belongs to the technical field of computer software. Background technique [0002] At present, digital signature technology based on public key cryptography has been widely used in e-commerce, identity authentication and other applications, and has become an indispensable tool to ensure information security. The idea of ​​digital signature is that users use private key to sign, so as to achieve identity authentication and other purposes. The security of private key is the basis of digital signature algorithm. [0003] Threshold digital signature is a technology proposed to ensure the security of private keys. Its idea comes from Shamir's secret sharing technology, that is, to split private keys and put them in different physical devices. Devices work together to complete the digital signature operation. In a (t, n) threshold digital signature scheme, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0861H04L9/3066H04L9/3247
Inventor 张振峰唐国锋
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products