Data processing method and device

A data processing and parameter technology, applied in the field of information security, can solve the problems of poor non-repudiation of KGC load identification private key, high single-point failure cost, etc., to reduce the risk of single-point failure and improve security.

Active Publication Date: 2020-11-17
HUAWEI TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a method and device for data processing, which solves the problem of high single-point failure cost caused by applying a single KGC architecture when generating a private key based on the SM9 identification cryptographic algorithm standard, and the KGC load is heavy and the non-repudiation of the private key is poor. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device
  • Data processing method and device
  • Data processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The technical solution in this application will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are a part of the embodiments of this application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0046] In order to facilitate the understanding of the technical solution of the present application, the technical terms and mathematical theories that may be involved in the present application are explained first.

[0047] 1. Identity-based cryptography (IBC): An identity-based cryptographic system, which is an asymmetric public-key cryptosystem. The concept of identifying passwords was proposed by Shamir in 1984. The main point is that certificates are not required in the system, and the trial user's identification (identity, ID)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data processing method and device. The data processing method comprises the steps that an ith secret key generation center obtains a first parameter xi and a first secret sharing share, the ith secret key generation center is any one of m preset secret key generation centers, the first parameter xi is a random positive integer, and m is an integer larger than 1; the ith key generation center generates a second secret sharing share according to the first parameter xi and the first secret sharing share; and the ith key generation center sends the first parameter xi and the second secret sharing share to the user. According to the technical scheme provided by the invention, the plurality of key generation centers participate in the generation process of an identification private key, so that security and non-repudiation of the identification private key are improved, and the load of a single key generation center and the cost of single-point failure are reduced.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a data processing method and device. Background technique [0002] Traditional public key systems generally use digital certificate mechanisms to realize the secure correspondence between user identities and user public keys, and digital certificates are generally implemented by public-key infrastructure (PKI) technology. This technology needs to establish a credible certificate authority (certificate authority, CA) to identify the identity of the user, and then issue a digital certificate for the user. A digital certificate binds user identity and user key together through digital signature. In the process of communication, users need to exchange certificates first, complete user identity authentication, and then perform information transfer and other operations. [0003] In the certificate-based public key system, the complexity of the certificate use p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L9/0825
Inventor 戴望辰章庆隆汤倩莹
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products