Method, device and storage medium for cooperative signature based on sm2 algorithm

An algorithm, a technology for signing messages, applied in the fields of information security and cryptography, can solve problems such as forged signatures, and achieve the effect of protecting integrity

Active Publication Date: 2021-10-01
北京信安世纪科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing cooperative signature scheme, when one party in the communication sends the message digest to the other party, the message digest may be replaced by the attacker, so that the attacker can forge the signature

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and storage medium for cooperative signature based on sm2 algorithm
  • Method, device and storage medium for cooperative signature based on sm2 algorithm
  • Method, device and storage medium for cooperative signature based on sm2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0120]Embodiments of the present invention provide a collaborative signature method, device and storage medium based on the SM2 algorithm to solve the technical problem in the prior art that signature messages are easily forged.

[0121] The technical solution in the embodiment of the present application is to solve the above-mentioned technical problems, and the general idea is as follows:

[0122] A method for collaborative signature based on the SM2 algorithm is provided, including: receiving a second elliptic curve random point and a second intermediate signature sent by a second participant; wherein, the second elliptic curve random point is generated by the second participant according to the second At least three elements on the additive group of the specified elliptic curve determined by the random number, the second intermediate signature is the two values ​​after the second sub-private key held by the second participant is confused; according to the message digest of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cooperative signature method, device and storage medium based on the SM2 algorithm, which are used to solve the technical problem that signature messages are easily forged in the prior art. The signature method implemented by the first participant includes: receiving the second elliptic curve random point determined by the second random number sent by the second participant and the second intermediate signature generated by confusing the held second sub-private key; The message digest of the message to be signed and the random point of the second elliptic curve generate the first part of the signature of the message to be signed; when the first part of the signature is determined to be The second intermediate signature generates the first intermediate signature; the first partial signature and the first intermediate signature are sent to the second participant, so that the second participant can generate the second part of the message to be signed based on the second sub-private key and the first intermediate signature Signature to form a complete signature of the message to be signed by the first part of the signature and the second part of the signature.

Description

technical field [0001] The invention relates to the fields of information security and cryptography, in particular to a method, device and storage medium for cooperative signature based on SM2 algorithm. Background technique [0002] In the field of information security and cryptography, PKI (Public Key Infrastructure, public key infrastructure) technology has become a more and more widely used general security technology since it appeared in the 1980s. As a technical system, the PKI system based on public key cryptography encrypts, decrypts, signs, and verifies data at the network transport layer and application layer, effectively ensuring the authenticity of user identities, confidentiality, and integrity of information. sex and signer non-repudiation, etc. [0003] Based on the application of PKI, the protection of the entity's private key is very important. The private key owned by an entity can only be accessed by the entity itself, and cannot be accessed by any other...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/0863H04L9/0869H04L9/3066H04L9/3247
Inventor 刘婷汪宗斌
Owner 北京信安世纪科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products