Secret key generation method, signature method, signature verification method, signature verification device, equipment and medium

A technology of key generation and key parameters, which is applied to secure communication devices and key distribution, can solve problems such as reducing key security, and achieve the effect of improving security and privacy

Active Publication Date: 2020-11-13
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing threshold signature technology often adopts a centralized key ge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key generation method, signature method, signature verification method, signature verification device, equipment and medium
  • Secret key generation method, signature method, signature verification method, signature verification device, equipment and medium
  • Secret key generation method, signature method, signature verification method, signature verification device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Exemplary embodiments of the present application are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present application to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0046] figure 1 is a schematic flowchart of a method for generating a key according to an embodiment of the present application. This embodiment is applicable to key generation in threshold signature, thereby improving the security and privacy of key generation. The key generation method disclosed in this embodiment can be executed by a key generation device, which...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret key generation method, a signature method, a signature verification method, a signature verification device, equipment and a medium, which relates to the technical field of computer encryption technologies and block chains, and can be used in cloud computing and cloud fields. According to the specific implementation scheme, the method comprises the following steps:determining a first local secret of a local node, segmenting the first local secret into secret fragments according to the number of the multi-party nodes, and transmitting the secret fragments to each node in the multi-party nodes in a one-to-one correspondence manner; and obtaining secret fragments segmented and transmitted by other nodes in the multi-party node, and generating a private key and a public key of an asymmetric key pair according to the obtained secret fragments of the multi-party node. According to the invention, the security and privacy of key generation can be improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to the field of computer encryption technology and blockchain technology, and specifically to a key generation method, signature and signature verification method, device, equipment and media. Background technique [0002] As the complexity of businesses handled by computers increases, a large number of businesses that require the cooperation of multiple parties to complete have emerged. In multi-party business, multi-party secure computing technology can be used to ensure that all participants cooperate to complete the calculation of tasks. In multi-party secure computing technology, threshold signature technology is used to ensure the security of data interaction. [0003] Threshold signature technology is a cutting-edge technical direction in the field of cryptographic signatures. In threshold signature technology, the key used by each participant is the key technol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0861H04L9/3255
Inventor 荆博
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products