Unlock instant, AI-driven research and patent intelligence for your innovation.

Threshold signature method and device, electronic equipment and readable storage medium

A threshold and node technology, applied in the information field, can solve problems such as signature failure and failure to identify malicious nodes, and achieve the effect of ensuring accuracy

Pending Publication Date: 2022-04-12
HUAWEI TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if there are malicious nodes among the threshold number of nodes, deliberately providing wrong signature data will cause the signature to fail. However, the current signature algorithm cannot identify malicious nodes, which will cause the signature to continue to fail.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threshold signature method and device, electronic equipment and readable storage medium
  • Threshold signature method and device, electronic equipment and readable storage medium
  • Threshold signature method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] Secret sharing can avoid the problem of key forgery due to the key held by the central node, but the current secret sharing has the following disadvantages: when the node uses the key signature, the key must be recovered according to the key fragmentation, then the key There is a risk of theft while restoring. The biggest feature of the threshold signature algorithm is that "the availability of the key is not visible". For example, in the threshold signature algorithm, the private key is shared by multiple nodes, each node holds a private key fragment in the private key, and each node can generate sign. Therefore, while the threshold signature algorithm provides key security, it also provides the availability of the key, so that the key is "available and invisible".

[0077] Blockchain is a decentralized or multi-centralized system, and it requires threshold keys in scenarios such as consensus mechanisms, joint payments, and voting. At present, most blockchains use t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a threshold signature method and device, electronic equipment and a readable storage medium, in the threshold signature method in the embodiment of the invention, a plurality of nodes can cooperatively generate a signature, and in the process of cooperatively generating the signature by the plurality of nodes, the nodes can verify intermediate data of the to-be-generated signature, so that the signature generation efficiency is improved. According to the embodiment of the invention, the node providing the wrong intermediate data can be used as the malicious node, the malicious node can be accurately identified, and the signature can be generated when the intermediate data passes the verification, so that the malicious node can be accurately identified. And the signature accuracy is ensured.

Description

technical field [0001] The embodiment of the present application relates to the field of information technology, and in particular to a threshold signature method, device, electronic equipment and readable storage medium. Background technique [0002] Secret sharing means that the key is split into multiple shard keys and shared by multiple nodes. Among them, any node less than the threshold number cannot restore the key according to the shared sharding key, and the nodes reaching the threshold number can recover the key according to the shared sharding key. Secret sharing avoids the problem of key forgery when the central node holds the key. [0003] In the current threshold signature algorithm, among multiple nodes, if there are nodes that reach the threshold number and sign according to their respective sharding keys, the signature is valid. However, if there are malicious nodes among the threshold number of nodes, deliberately providing wrong signature data will cause ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L9/08
Inventor 周李京
Owner HUAWEI TECH CO LTD