Combined signature and verification signature method, system and storage medium

A technology for verifying signatures and signatures, applied in the field of blockchain, it can solve the problems of not involving assets custody to third-party institutions, low feasibility of private key shares, attacks, etc., to avoid security problems and credit risks, and to improve the feasibility of the scheme. sex, risk reduction effect

Active Publication Date: 2022-06-03
SHANGHAI WANXIANG BLOCK CHAIN CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The Chinese patent application publication number CN110741600A has published "Providing Decentralized Protocols to Retrieve Encrypted Assets Computer-implemented System and Method", which enables two types of signatures to be accessible by setting access rights to digital assets on the blockchain This digital asset, and introduces the collective storage private key share of the decentralized blockchain network, which is used to generate a threshold signature to represent the user's access to the digital asset. Although the possible security risks of private key distribution and copying are avoided, there is still a risk of Sybil attack
And due to the irreversible nature of the private key-public key generation process, additional access rights are set for digital assets that have been stored under a certain pair of private key-public keys in the blockchain, that is, a private key that meets the threshold signature requirements is deduced backward from a public key. Key share feasibility is very low
[0005] And the above two technologies provide solutions to deal with the loss of private keys for the situation where the user owns the complete private key, and do not involve the situation where the user entrusts the assets to a third-party organization, and solves third-party credit risks and other issues
[0006] Prior art, such as "A Signature Method, Device and System Based on Secure Multi-Party Computing" published by the Chinese patent application publication number CN109934585A, proposes to allow multiple parties to hold private keys or private key fragments, and based on multiple signatures and threshold signatures , secure multi-party computing and other technologies to manage the control of assets, can split the control to multiple parties, avoid the credit risk caused by a single party holding control, and only need m of n parties (m<=n) use private The signature can be completed by fragmenting the private key or private key, and it is applied to scenarios involving multi-party signatures such as users, business parties, and supervisors. There is a possibility that at least m parties other than the user may jointly forge signatures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Combined signature and verification signature method, system and storage medium
  • Combined signature and verification signature method, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will contribute to the skill in the art

[0085] The grouping method and the signature conditions set by each group are designed according to specific business scenarios, and there may be many forms.

[0090] The step 2 is characterized in that the shared public key combination includes at least two public key elements;

[0091] It is also characterized in that the public key element can be a single sub-public key or a sub-public key list;

[0098] The device-side cluster may correspond to roles such as users or user groups, business parties, and supervisors.

[0100] The routine signature verification subroutine judges whether each routine necessary public key element exists in the shared public key combination

[0102] Preferably, the system can set a device access mechanism, such as a consortium chain system, which consists of a plurality of independen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a combination signature and signature verification method, system and medium, including: step S1: N groups of equipment ends form a equipment cluster, the equipment cluster determines the combination mode, creates registration, signature and signature verification procedures and submits them to the system; Step S2: The device-side clusters generate private keys or private key fragments locally according to the initialization program; generate a shared public key combination based on at least two combinations of the private key or private key fragments; the shared public key The combination is used to mark the object to be operated, and the private key or private key fragment is used to generate the signature and permit the operation on the marked object. The present invention distinguishes and recombines the signatures generated by multiple groups of device terminals, and sets multi-level signature verification conditions for the combined signatures, so as to realize splitting the control right to multiple parties while retaining the absolute control right of some signatories, and solve the problem involving third parties. The problem of federated counterfeit signatures can arise with hosted prior art.

Description

Combined signature and signature verification method, system and storage medium technical field The present invention relates to the technical field of block chain, in particular, to combined signature and verification signature method, system and storage medium. Background technique The private key-public key pair based on asymmetric cryptography technology and its signature and verification operations are often used in CA certificate systems. In the security infrastructure of application scenarios such as system, data transmission, digital asset transaction, and electronic contract signing, it has been faced with two difficult situation. Take the digital asset transaction that has received more attention in recent years as an example: by generating a set of private key-public key pairs, use the public key to Declare a certain digital asset and quantity, and use the private key to control its transfer. On the one hand, existing application tools such as wallets ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/40
CPCH04L9/3247H04L9/3255H04L9/085H04L9/3263H04L63/0442H04L9/50
Inventor 曹一新欧阳健男晏鹤春赵宇时
Owner SHANGHAI WANXIANG BLOCK CHAIN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products