Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Signature key generation and related methods and systems, computer device and storage medium

A technology of signature key and generation system, applied in the field of data security, can solve the problem that the generation of user signature key cannot be controlled and affect the security of user signature key, etc., and achieve the effect of effective control

Pending Publication Date: 2022-05-13
北京无字天书科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with the above technology is that the user cannot control the generation of the user signature key, which in turn affects the security of the user signature key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature key generation and related methods and systems, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0085] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by those skilled in the technical field of the application; the terms used herein in the description of the application are only to describe specific embodiments The purpose is not to limit the present a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a signature key generation method and a corresponding signature key generation system, a digital signature generation method, a digital signature verification method, a digital signature generation system, a digital signature verification system, computer equipment and a computer readable storage medium. The signature key generation method comprises the following steps: generating system parameters through a first key generation center KGC1 and a second key generation center KGC2; a signature private key and a user signature primary public key are generated. According to the signature key generation method, the user can effectively control the signature key, and the safety problem of the hosting problem of the user key, namely the complete control of the KGC on the user signature key under the single KGC, is solved.

Description

technical field [0001] The invention belongs to the technical field of data security, and particularly relates to a method for generating a signature key of an SM9 user, a corresponding system for generating a signature key, a method for generating a digital signature, a method for verifying a digital signature, a system for generating a digital signature, a system for verifying a digital signature, and a computer devices and computer readable storage media. Background technique [0002] The SM9 identity encryption algorithm is an identity-based encryption algorithm released by the State Cryptography Administration in 2016. The SM9 identity encryption algorithm uses the user identity as the public key for the user signature, and the user private key is generated by the Key Generation Center (KGC) based on the user identity and the master private key generated by the KGC. Since the user ID is used as the user signature public key, compared with the traditional certificate-ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/3247H04L9/3066H04L9/0869H04L9/083
Inventor 封维端袁峰张立圆
Owner 北京无字天书科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products