Verifiably encrypted signature generation method and system

A signature value and encrypted public key technology, which is applied in the field of cryptography and information security, can solve problems such as impact, and achieve the effect of high portability and easy deployment

Active Publication Date: 2018-11-06
GUANGDONG CERTIFICATE AUTHORITY
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a verifiable encrypted signature generation method and system for the above-mentioned problems affecting the security of the generated verifiable encrypted signature, which can jointly generate verifiable encrypted signatures without revealing their respective private key shares, and improve safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiably encrypted signature generation method and system
  • Verifiably encrypted signature generation method and system
  • Verifiably encrypted signature generation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Embodiments of the verifiable encrypted signature generation method and system of the present invention will be described below in conjunction with the accompanying drawings.

[0036] In the following embodiments, a scenario in which multiple participants collaborate to generate verifiable encrypted signatures is considered. Suppose there are n parties P 1 , P 2 ...,P n , n>2. Participants P1, P2...Pn correspond to an identity ID1,..., IDn respectively; then, n participants participate in the process of generating verifiable encrypted signatures in turn in the form of a ring. Of course, in practical applications, the participant P 2 ...,P n It is also possible to agree on a group mark as a common identity ID.

[0037] refer to figure 1 as shown, figure 1 It is a flowchart of a method for generating a verifiable encrypted signature according to an embodiment, including:

[0038] Step S110: Participant P1 generates its decryption private key, splits the agreed si...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a verifiably encrypted signature generation method and system. The method comprises the following steps that n participants P1, P2 to Pn are arranged; an identity (ID) is agreed by the participant according to a preset rule; and the n participants participate in a verifiably encrypted signature generation process in the form of a ring in sequence. According to the method and the system, the participants participate in generation of a verifiably encrypted signature together on the premise that each private key share is not leaked, , and the safety of the generated verifiably encrypted signature can be ensured.

Description

technical field [0001] The invention relates to the technical field of cryptography and information security, in particular to a method and system for generating a verifiable encrypted signature. Background technique [0002] Verifiable encrypted signature is a core tool to solve the problem of fair exchange, and this technology is a research hotspot in current privacy signature verification technology. With the development of cloud computing, blockchain and other distributed technologies, key generation also has new application scenarios, and participants need to secretly agree on a private key. In this application scenario, the security of generating verifiable cryptographic signatures is particularly important. [0003] In the existing technology, the participants need to pre-agree on a complete private key. For all parties, the complete private key is divided and then saved. It is difficult to keep their respective private key shares secret, which will easily lead to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/14H04L9/30H04L9/32
CPCH04L9/0643H04L9/0863H04L9/14H04L9/30H04L9/3247H04L9/3263
Inventor 卢伟龙张永强
Owner GUANGDONG CERTIFICATE AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products