Device and method for generating SM2 signature private key capable of secretly sharing and hiding identity

A technology for generating device and secret sharing, which is applied in the field of cryptographic engineering and can solve the problems of limited computing power of terminals, difficulty in protecting secure data, and difficulty in protecting signature private keys.

Pending Publication Date: 2022-02-11
中安网脉(北京)技术股份有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the rapid development of 5G technology, mobile Internet, and even the rapid development of intelligent networked vehicles, more and more terminals have limited computing power, and more and more data need to be processed concurrently. Thousands of instructions need to be received every second. If each instruction needs to query the effectiveness and timeliness of the data source through the network, the computing resources of the gateway will become the bottleneck that limits the application.
[0004] On the other hand, with the development of mobile Internet technology, there are more and more applications in mobile smart terminals, and it will become more and more difficult to protect the security data in it. It is extremely difficult to protect the signature private key used by digital certificates.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for generating SM2 signature private key capable of secretly sharing and hiding identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The device and method for generating a secret-shared hidden identity SM2 signature private key of the present invention will be further described in detail in conjunction with the embodiments below.

[0030] The hidden identity SM2 signature private key generation device of the present invention can verify the identity and timeliness of the digital certificate corresponding to the private key of the client in an offline manner, and at the same time support the splitting of the private key into two parts, one for storage On the client side, another copy is stored on the server side, and the data is signed by means of joint signature.

[0031] figure 1 It is a diagram of the generation process of the SM2 signature public and private key that hides the identity of the client in the present invention.

[0032] The specific process is as follows:

[0033] Step 1: The server generates and publishes the root certificate, P pub =s G, where s∈[1,n-1], s is the master private ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device and a method for generating an SM2 signature private key capable of secretly sharing and hiding an identity, belongs to the field of password engineering, and is used for solving the problems of mobile Internet private data protection and online certificate query. The method is characterized in that a client side and a server side independently generate part of factors of a client side private key, the two factors cooperatively operate and publish D1, DS and Q declaration parameters, the client side and the server side cannot calculate the complete private key of the client side according to the parameters generated and obtained by the client side, but the client side identity can be authenticated offline through the declaration parameters; and meanwhile, the server side can calculate and issue a complete public key of the client side, and effective fusion of two safety protection measures of offline authentication and online joint signature is achieved.

Description

technical field [0001] The invention belongs to the field of cryptographic engineering, and in particular relates to a device and a method for generating a hidden identity SM2 signature private key that can be shared secretly. Background technique [0002] Digital certificates are the identity proofs of organizations, individuals, equipment, codes, etc. in the Internet. With digital certificates, identity authentication, behavior identification, data signature, behavior non-repudiation, contract signing, electronic transactions, etc. can be realized in the virtual world. [0003] During the use of digital certificates, it is necessary to verify online whether it is issued by an authoritative digital certificate service organization and has not expired, so as to ensure the authenticity and validity of the user's identity. With the rapid development of 5G technology, mobile Internet, and even the rapid development of intelligent networked vehicles, more and more terminals have...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0869H04L9/0825H04L9/085H04L9/3268H04L9/3252
Inventor 刘歆李智虎
Owner 中安网脉(北京)技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products