Two-party collaborative signature method based on SM2 algorithm for resisting energy analysis attack

An energy analysis attack and signed message technology, applied to the public key and key distribution of secure communication, can solve the problems of signature algorithm failure, security risks, parameter generation errors, etc., to ensure correctness and validity, and resist energy analysis. The effect of attacking, ensuring correctness and validity

Active Publication Date: 2021-02-26
UNIVERSITY OF CHINESE ACADEMY OF SCIENCES
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Energy analysis attack is a method of side-channel attack. By observing and analyzing the energy consumption of cryptographic devices such as encryption modules or cryptographic chips when performing encryption / decryption operations, the secret information inside the device is recovered, which is safe for the practical application of various cryptographic algorithms. posed a serious threat
In the existing similar methods, the sub-private key of the second communication party is always multiplied by a publicly available value, and then added to some publicly determined values. The attacker can accumulate a certain number of digital signatures and analyze them with the sub-private key. The difference between the multiplier factors multiplied by the private key is used to infer the sub-private key of the second communication party, which poses a great security risk
[0024] On the other hand, the same kind of cooperative digital signature method or system based on SM2 algorithm lacks the verification and confirmation of the correctness of system parameters, signature parameters and signature results, and there is a problem that the signature algorithm fails or the signature is invalid due to parameter generation errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-party collaborative signature method based on SM2 algorithm for resisting energy analysis attack
  • Two-party collaborative signature method based on SM2 algorithm for resisting energy analysis attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The two-party cooperative signature method based on SM2 against energy analysis attack proposed by the present invention comprises the following steps:

[0051] (1) User A, the first communication party and the second communication party jointly discuss the public parameters required to generate the signature process, and the public parameters include the elliptic curve related parameters q and F of the SM2 algorithm q . q is a finite field containing q elements, E is an elliptic curve defining Fq, and G is a base point on an elliptic curve of order n;

[0052] (2) The first communication party and the second communication party respectively generate their own sub-keys and jointly generate the public key of user A. The flow chart is as follows figure 1 shown, including the following steps:

[0053] (2-1) The first communication party uses a random number generator to generate a random number d 1 , d 1 ∈[1,n-1], and the random number d 1 As the sub-private key of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of passwords, and particularly relates to a two-party collaborative signature method based on an SM2 algorithm for resisting an energy analysis attack. Themethod comprises the following steps: 1) initializing signature parameters; 2) the two communication parties generate a sub-key and a user public key; 3) generating a collaborative signature. Two cooperative parties and a user agree with public parameters used in a cooperative signature process; the two cooperative parties generate and store SM2 sub-keys and collaborate to generate a user publickey; the two cooperative parties cooperate to complete message signature; any party cannot obtain the sub-private key of the opposite party, so that the security of the SM2 signature private key is improved. Compared with an existing collaborative signature scheme based on an SM2 algorithm, the invention has the advantages that 1) verification of signature parameters, a user public key and a signature result is added, and the effectiveness of collaborative signature is ensured; and 2) the generated collaborative signature result can effectively resist an energy analysis attack.

Description

technical field [0001] The invention belongs to the technical field of cryptography, and in particular relates to a two-party cooperative signature method based on an SM2 algorithm that is resistant to energy analysis attacks. Background technique [0002] The SM2 algorithm is an elliptic curve public key cryptographic algorithm issued by the State Cryptography Administration, which can be used for encryption, decryption and digital signature, and has high application value in actual production. For details of the standard algorithm, please refer to "GM / T 0003-2012SM2 Elliptic Curve Public Key Cryptography Algorithm". However, the SM2 algorithm is only suitable for one-party signatures, and is vulnerable to security issues such as private key disclosure and single-point failure. In this regard, the cooperative signature scheme can effectively improve the security of the private key. No one of the coordinating parties in the collaborative signature scheme can own or recover...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L9/08
CPCH04L9/3066H04L9/3252H04L9/0816H04L9/0869H04L9/0838
Inventor 荆继武尤玮婧王平建刘丽敏王跃武雷灵光寇春静
Owner UNIVERSITY OF CHINESE ACADEMY OF SCIENCES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products