SM2 two-party collaborative signature method suitable for lightweight client and medium

A lightweight client and client technology, applied in the field of information security, can solve the problems of loss, theft of signature keys, etc., and achieve the effect of ensuring security

Active Publication Date: 2020-04-14
WUHAN UNIV
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In decentralized currency transactions, such as Bitcoin transactions, multiple parties also need to sign a transaction at the same time. If the signature key is stolen, it will cause direct economic losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2 two-party collaborative signature method suitable for lightweight client and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0042] The present invention proposes a scheme for two parties to jointly generate SM2 digital signatures. In this solution, when generating the SM2 digital signature, two parties participate together, one is the client U and the other is the server S. At this stage, the client U and the server S use their partial private keys to collaboratively generate the SM2 signature on the message m. The following steps should be implemented:

[0043] 1).U in Select the third random number k U As part of the temporary private key, calculate e=H(Z||m) and the first part of the temporary public key K U =k U ·D U ·G. Finally U sends (e, K U ) To S.

[0044] 2).S in Select the fourth random number k S As part of the private key, calculate the temporary public key Calculate the first part of the signature r=x 1 +e mod q, generate intermediate variable s′=d S ·(K S +r)mod q. Finally, S returns (r, s′) to U.

[0045] 3).U calculates the second part signature s=d U ·(S′+d U ·K U )-rmod q, use P ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network architecture for an unbalanced client/server. The invention relates to a scheme for generating an SM2 digital signature through cooperation of two parties, in particular to an SM2 two-party cooperative signature method suitable for a lightweight client and a medium, and in the scheme of the invention, when an SM2 digital signature is generated, the two parties participate together, one party is a client U, and the other party is a server S. And the client U and the server S cooperatively generate an SM2 signature about the message m by using respective partialprivate keys at the current stage. The method has the advantages of being high in safety, easy to implement and easy to verify.

Description

Technical field [0001] The invention belongs to the field of information security technology, and particularly relates to a method and system for generating SM2 digital signatures for a two-party unbalanced light-weight client. Background technique [0002] Digital signature is an important part of public key cryptosystem and plays an important role in many occasions. Commonly, one party generates a digital signature, which can be publicly verified. In some cases, multiple parties are required to generate electronic signatures for a document. For example, some highly confidential documents need to be signed by multiple persons. In decentralized currency transactions, such as Bitcoin transactions, multiple parties also need to sign a transaction at the same time. If the signature key is stolen, it will cause direct economic losses. The generation of an electronic signature by multiple parties has therefore become a research hotspot. [0003] For this kind of problem, the more com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3252Y02D30/50
Inventor 何德彪冯琦罗敏李莉黄欣沂
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products