Unlock instant, AI-driven research and patent intelligence for your innovation.

An Efficient Two-Party Cooperative Signature Method Based on SM2

An efficient and legal technology, applied in the field of information security, can solve problems such as signature private key leakage, achieve strong security, low computing cost, and improve efficiency

Active Publication Date: 2021-06-29
WUXI ALEADER INTELLIGENT TECH
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] In summary, during the signature phase, there may be a risk of signature private key leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Efficient Two-Party Cooperative Signature Method Based on SM2
  • An Efficient Two-Party Cooperative Signature Method Based on SM2
  • An Efficient Two-Party Cooperative Signature Method Based on SM2

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0043] image 3 It is a schematic diagram of the present invention, an efficient SM2-based two-party collaborative signature method of the present invention, including:

[0044] Set system parameters for generating the user public key Q of the signer A , Q B , to verify the public key Q AB , Q' AB and collaborative signature (r, s); at the same time, the system parameters are also used to verify the validity of the signature;

[0045] The signer randomly selects the secret value according to the Generate your own user public key Q ID And sent to another signer, where ID∈{A,B}, ID represents identity, A is the first signer, B is the second signer;

[0046] The signer generates the verification public key Q based on the other party's user publ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an efficient two-party cooperative signature method based on SM2, which belongs to the technical field of information security. In order to realize the digital signature service safely and efficiently, the method of the present invention includes after initializing the system parameters, the signer U A and U B Generate your own user public key Q according to your randomly selected secret value A and Q B , and sent to the other party; U A and U B Generate a verification public key Q based on the other party's user public key AB , Q' AB , and Q AB , Q' AB Submit to CA while storing Q locally AB , Q' AB , its own secret value and the other party’s public key; U A and U B According to the middle value of the other party (R ID ,t ID ) to confirm whether the other party is a legal participant of the signature; if so, U A Send a certificate signing request to the CA, and start generating sub-signatures; finally, through the interaction between the two parties, U A Generate a signature (r,s). The invention is used for message signature and message verification in the communication network, and provides message integrity, authentication, non-repudiation and anti-partial key leakage attack services.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an efficient two-party cooperative signature method based on SM2. Background technique [0002] Signature (Signature) is a basic primitive in cryptography, which provides message integrity, authentication and non-repudiation. Integrity means that the message cannot be tampered with during transmission; authenticity means that the receiver believes that the signature comes from the signer; non-repudiation means that the signer cannot deny his signature afterwards. A digital signature scheme generally has two components, namely the signature (Signature) method and the verification (Verification) method. In the signature method, the system inputs a message m and a private key k, and outputs a digital signature for m; in the verification method, the system inputs m and its corresponding digital signature, and the output is true or false. In the signature method, once t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3066H04L9/3252
Inventor 李正宏陈黎明李磊周雨阳李发根
Owner WUXI ALEADER INTELLIGENT TECH