Multi-party collaborative EdDSA digital signature generation method and medium

A digital signature and multi-party technology, applied in the field of information security, can solve problems such as threats to security and fairness, and achieve the effect of ensuring security

Pending Publication Date: 2020-04-10
WUHAN UNIV
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But when the complete signature key is recovered, the party holding the complete signature key can sign independently without the knowledge of other participants, threatening security and fairness
[0004] Researchers have proposed a variety of collaborative signature algorithms with different schemes and different characteristics, but there is no collaborative signature algorithm for EdDSA digital signatures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party collaborative EdDSA digital signature generation method and medium
  • Multi-party collaborative EdDSA digital signature generation method and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0043] This scheme contains two algorithms: Key Generation Algorithm and Cooperative Signature Algorithm.

[0044] 1. Key generation algorithm

[0045] The EdDSA key generation algorithm is jointly participated by multiple parties, In order to calculate the partial signature private key, each participant performs the following operation steps (order denote each party that performs the following steps, let Expressed with P i other parties involved in the interaction):

[0046] a. Generate the first b-bit random number k i As part of the private key, for k i Perform a hash operation to get the first hash value Computes the first public key scalar And thus calculate the first part of the public key A i =[s i ] B. Last P i send a i To all other parties P j .

[0047] b. When receiving A from all other participants j , P i Computing the collaborative public key

[0048] 2. Collaborative signature algorithm

[0049] participant collection At this stage, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a multi-party collaborative EdDSA digital signature generation method and a medium. The method comprises the following steps of: generating a secret key, specifically, cooperatively generating an EdDSA signature about a message M by a participant set by utilizing secret key information of a secret key generation stage in the stage in order to calculate a part of signatureprivate keys and a cooperative signature by multi-party joint participation. The method is suitable for two-party or more than two-party collaborative signature application scenarios, can prove the security of the collaborative signature application scenarios, and has the characteristics of high security, simplicity in implementation and easiness in verification.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to an efficient collaborative generation method for an EdDSA digital signature algorithm. Background technique [0002] Digital signature is a kind of cryptographic technology that emerges with the development of information network security to ensure the integrity, authenticity and non-repudiation of data. EdDSA (Edwards-curve Digital Signature Algorithm) is a Schnorr variant digital signature scheme based on the Twisted Edwards curve (see "Edwards-Curve Digital Signature Algorithm (EdDSA)" RFC8032.ISSN 2070-1721). The Twisted Edwards curve has been the focus of attention since it was introduced by Bernstein et al. in 2007. Compared with the existing digital signature algorithm, the calculation speed is faster, and the key and signature space are also smaller. The advantages can be said to be very obvious. Cryptocurrencies such as Rocoin and Zcash have switched their ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3252
Inventor 何德彪冯琦
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products