The invention provides a management method, apparatus and
system for remotely destroying a private key. A
client stores a first part of the private key dc, a
server side stores a second part of the private key ds, and an
electronic signature is generated after cooperative calculation on the first part of the private key and the second part of the private key. The method comprises the following steps: sending a digest e and a random elliptic curve point Q by the
client to the
server side; receiving a first intermediate signature ts of the
server side; and calculating a second intermediate signature tc through the ts and the dc, and sending the tc to the
server side so that the
server side can calculate a second part of the signature s and verify the e, if
verification succeeds, a signature result (r, s) is sent to an
authentication end for
verification, and if the
verification fails, the second part of the private key ds stored at the
server side is destroyed. According to the invention, through the design of a key
system for storing partial private keys respectively by using a
client and a trusted central server and through combination with the technical means of dynamic key destruction,
hacker attacks such as client-side single-point attacks, exhaustive
trial and error attacks and the like are avoided.