Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Combined signature, signature verification method and system and storage medium

A technology for verifying signatures and signatures, applied in the blockchain field, which can solve the problems of fake signatures, attacks, and the existence of witches

Active Publication Date: 2020-11-24
SHANGHAI WANXIANG BLOCK CHAIN CO LTD
View PDF12 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The Chinese patent application publication number CN110741600A has published "Providing Decentralized Protocols to Retrieve Encrypted Assets Computer-implemented System and Method", which enables two types of signatures to be accessible by setting access rights to digital assets on the blockchain This digital asset, and introduces the collective storage private key share of the decentralized blockchain network, which is used to generate a threshold signature to represent the user's access to the digital asset. Although the possible security risks of private key distribution and copying are avoided, there is still a risk of Sybil attack
And due to the irreversible nature of the private key-public key generation process, additional access rights are set for digital assets that have been stored under a certain pair of private key-public keys in the blockchain, that is, a private key that meets the threshold signature requirements is deduced backward from a public key. Key share feasibility is very low
[0005] And the above two technologies provide solutions to deal with the loss of private keys for the situation where the user owns the complete private key, and do not involve the situation where the user entrusts the assets to a third-party organization, and solves third-party credit risks and other issues
[0006] Prior art, such as "A Signature Method, Device and System Based on Secure Multi-Party Computing" published by the Chinese patent application publication number CN109934585A, proposes to allow multiple parties to hold private keys or private key fragments, and based on multiple signatures and threshold signatures , secure multi-party computing and other technologies to manage the control of assets, can split the control to multiple parties, avoid the credit risk caused by a single party holding control, and only need m of n parties (m<=n) use private The signature can be completed by fragmenting the private key or private key, and it is applied to scenarios involving multi-party signatures such as users, business parties, and supervisors. There is a possibility that at least m parties other than the user may jointly forge signatures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Combined signature, signature verification method and system and storage medium
  • Combined signature, signature verification method and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0081] The present invention proposes a combined signature and signature verification method that distinguishes signature weights and operation rights of different role parties, including four steps of initialization, registration, signature, and signature verification. By introducing conventional necessary public key elements, some signatories are given absolute control. Avoid third-party trusteeship credit risk, and introduce alternative signature and signature verification process to solve the problem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a combined signature and a signature verification method and a system and a medium, and the method comprises the steps: S1, enabling N groups of equipment ends to form an equipment cluster, enabling the equipment cluster to determine a combination mode, creating a registration, signature and verification signature program, and submitting the registration, signature and verification signature program to the system; S2, generating private keys or private key fragments locally by the equipment end clusters according to initialization programs; generating a shared public keycombination based on at least two combinations formed by the private key or the private key fragments; wherein the shared public key combination is used for marking a to-be-operated object, and the private key or the private key fragment is used for generating a signature and permitting the operation related to the marked object. The signatures generated by multiple groups of equipment terminalsare distinguished and recombined, and multi-level signature verification conditions are set for combined signatures, so that absolute control rights of part of signature parties are reserved while thecontrol rights are split to multiple parties, and the problem that joint false signatures may occur in the prior art related to third-party hosting is solved.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to methods, systems and storage media for combining signatures and verifying signatures. Background technique [0002] The private key-public key pair and its signature and verification operations based on asymmetric cryptography are often used in the security infrastructure of application scenarios such as CA certificate system, data transmission, digital asset transaction, and electronic contract signing. Dilemma. Take the digital asset transaction that has attracted more attention in recent years as an example: by generating a set of private key-public key pairs, use the public key to declare a certain digital asset and its quantity, and use the private key to control its transfer. On the one hand, existing application tools such as wallets can generate and store private keys and public keys on local devices for users to ensure absolute control over digital assets b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/3247H04L9/3255H04L9/085H04L9/3263H04L63/0442H04L9/50
Inventor 曹一新欧阳健男晏鹤春赵宇时
Owner SHANGHAI WANXIANG BLOCK CHAIN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products