Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Double-threshold signature method based on ECDSA

A dual-gate, node technology, applied in user identity/authority verification and key distribution, can solve the problems of inability to obtain rights and reduce the security of the scheme.

Active Publication Date: 2020-06-05
杭州泛链科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The common threshold signature scheme is suitable for the following scenarios: a certain right needs to be managed by n individuals, but for security reasons, it is impossible to obtain the right even if any (t-1) of them are required to communicate privately
However, such a solution cannot meet more complex equity management scenarios. For example, a certain equity needs to be managed by n organizations, and any (t-1) organizations can not obtain the equity if they are required to have private relationships; For security reasons, it is necessary to entrust the rights and interests representing the organization to m members for management, and any (u-1) members among them cannot obtain the rights and interests representing the organization
In addition, some existing threshold algorithms temporarily restore the main private key during the generation of the sub-private key or during the signing process, or require a trusted center, which greatly reduces the security of the entire scheme. needs to be optimized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-threshold signature method based on ECDSA
  • Double-threshold signature method based on ECDSA
  • Double-threshold signature method based on ECDSA

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] The purpose and effects of the present invention will become clearer by describing the present invention in detail according to the accompanying drawings and preferred embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0103] The ECDSA-based double-threshold signature method of the present invention is mainly composed of two parts: generating a parent public key and a grandson private key and synthesizing a signature. The first part is equivalent to the initialization of the system, and the second part is equivalent to the use of the system.

[0104] 1. Generate parent public key and grandson private key (such as figure 1 shown)

[0105] In this process, (i, j) is used to represent a certain node, i represents the large group where the node is located, and j represents the serial number of the node in the large group, (α, β) is used to represent another ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dual-threshold signature method based on ECDSA. An asymmetrically encrypted main private key is divided into n groups, and each group has m grandson private keys. In any t groups, any u grandson private keys in each group are subjected to security calculation, one piece of information can be electronically signed, and the result is the same as the result obtained by directly signing the information with the main private key. However, if the number of the grandson private keys participating in calculation in a certain group is less than u or the number of groups participating in calculation is less than t, a correct signature result cannot be obtained. In addition, in the scheme proceeding process, no person can obtain the mother private key of the system or the child private key representing any group. In the method, n, m, t and u are self-defined parameters, and a user can set the parameters by himself / herself according to his / her own needs. According to theinvention, the application scene of the single-layer threshold signature is expanded, and the security is improved.

Description

technical field [0001] The invention relates to the field of electronic information security, in particular to an ECDSA-based double-threshold signature method. Background technique [0002] Nowadays, more and more Internet services are based on electronic signatures of asymmetric encryption algorithms to verify user identities, such as the transfer of a certain amount of funds. The common threshold signature scheme is suitable for the following scenarios: a certain right needs to be managed by n individuals, but for security reasons, it is impossible to obtain the right even if any (t-1) of them are required to communicate privately. However, such a solution cannot meet more complex equity management scenarios. For example, a certain equity needs to be managed by n organizations, and any (t-1) organizations cannot obtain the equity if they are required to have private relationships; For security reasons, it is necessary to entrust the rights representing the organization t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0869H04L9/3255
Inventor 徐凡马聪
Owner 杭州泛链科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products