Unlock instant, AI-driven research and patent intelligence for your innovation.

Signature method and device for dispersing private key, storage medium and processor

A device and private key technology, applied in the field of information security, can solve problems such as being vulnerable to quantum computer attacks and poor security

Pending Publication Date: 2022-03-15
CCB FINTECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiment of this application is to provide a signature method, device, storage medium and processor for dispersing private keys, aiming to solve the problem that the signature algorithm of dispersing private keys in the prior art is vulnerable to quantum computer attacks, and the security is relatively low. bad question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature method and device for dispersing private key, storage medium and processor
  • Signature method and device for dispersing private key, storage medium and processor
  • Signature method and device for dispersing private key, storage medium and processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. It should be understood that the The specific implementation manners described are only used to illustrate and explain the embodiments of the present application, and are not used to limit the embodiments of the present application. Based on the embodiments in the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0069] It should be noted that if there are directional indications (such as up, down, left, right, front, back...) in the embodiment of the present application, the directional indications are only used to explain the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a signature method and device for dispersing private keys, a storage medium and a processor. Generating and outputting a public key component according to the private key component by controlling each equipment component; generating a target public key according to the public key component; the control equipment component generates and outputs a signature intermediate vector; determining a first hash value according to the signature intermediate vector; outputting the first hash value to the device component, so that the device component generates and outputs a signature component according to the first hash value, the private key component and the signature intermediate vector; generating a signature result according to the signature component; and verifying the signature result according to the target public key. Through redesign on the basis of the classical signature algorithm Fiat-Shamir with Aborts with quantum computer attack resistance, the private keys are supported to be dispersed to a plurality of devices, final signature is completed, and the problems that a traditional signature algorithm of dispersed private keys is prone to being attacked by quantum computers and is poor in safety are solved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a signature method, device, storage medium and processor for dispersing private keys. Background technique [0002] As an extension of the financial system, the mobile client is one of the security risks at the end of the financial system. This is because the mobile client side does not have a powerful firewall device on the server side, so it is more vulnerable to attacks than the server side. Furthermore, the application code of the mobile client is more vulnerable to reverse analysis by hackers, resulting in the leakage of private keys related to user identities. Once the user's identity private key is leaked, it means that hackers can impersonate the user to carry out all commercial activities, which may cause large financial losses and even bring legal risks to customers. [0003] For this reason, in the digital signature scheme of the mobile client,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38
CPCG06Q20/3825G06Q20/3829
Inventor 谢丹力吴磊李鑫张二毛李爱宏闫党军
Owner CCB FINTECH CO LTD