Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method for generating SM2 blind signature through cooperation of two parties

A blind signature and signer technology, applied in the field of cryptography, can solve the problems of being unsuitable for local environments with limited computing power and limited storage space, unable to meet the needs of message privacy protection, and unable to meet application requirements, so as to reduce local storage consumption , saving computing costs, and the effect of large storage

Inactive Publication Date: 2021-11-19
XIAN UNIV OF POSTS & TELECOMM
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the two-party application scenario of the SM2 digital signature algorithm, the currently proposed scheme can realize the two-party collaborative signature function based on SM2 alone or the blind signature function based on SM2. The former cannot meet the needs of message privacy protection, and the latter cannot meet the two-party participation Signed Application Requirements
Secondly, in the existing scheme, users consume a lot of computing resources when performing signature operations, which is not suitable for local environments with limited computing power and limited storage space.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating SM2 blind signature through cooperation of two parties
  • Method for generating SM2 blind signature through cooperation of two parties
  • Method for generating SM2 blind signature through cooperation of two parties

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0065] The present invention provides a method for two parties to cooperate to generate an SM2 blind signature, including four stages of system parameter establishment, generation of a partial private key and public key for signature verification, signature generation and signature verification;

[0066] The signing process is jointly executed by the user, the first signer and the second signer: the user sends a signature request and blinds the message, and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for generating an SM2 blind signature through cooperation of two parties, provides a two-party blind signature system suitable for a cloud environment by applying the method for generating the SM2 blind signature through cooperation of the two parties, and particularly relates to the technical field of passwords. The method comprises four stages of system parameter establishment, partial private key and signature verification public key generation, signature generation and signature verification. According to the method, two parties except the user are allowed to participate in blind signature operation together, the user can select corresponding signers according to different application requirements, and by means of safe and efficient computing service of the cloud server, local storage consumption is reduced, computing cost is saved, and collaborative blind signature operation is carried out in a distributed environment with unbalanced computing resources; by adding signature participants, the possibility of signature counterfeiting caused by secret key leakage is reduced, the attack cost is increased due to scattered storage of secret keys, and the security of the signature secret keys can be improved; by using the blind signature property, the signature participants cannot predict the content of the original message, so that the message privacy is protected.

Description

technical field [0001] The present invention relates to the technical field of cryptography, and more specifically, the present invention relates to a method for two parties to cooperate to generate an SM2 blind signature. Background technique [0002] In the public key cryptosystem, the key is the credential used to confirm the user's identity and ensure that the user has relevant permissions. Digital signature technology is an important branch of public key cryptography. The safe storage and reasonable use of signature keys are the basic requirements to ensure the legal validity of signatures. However, with the popularization and application of the Internet in recent years, the generation of massive information has increased the difficulty of data storage and data management, and information leakage incidents have occurred frequently, and personal information has become the object of transactions. Similarly, the signature key is usually at risk of being lost because it is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3257H04L9/3066
Inventor 秦宝东白雪郭瑞郑东
Owner XIAN UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More