Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A double threshold signature method based on ecdsa

A double-door and multiplication technology, applied in the field of electronic information security, can solve the problems of reducing the security of the scheme and not being able to obtain rights and interests, and achieve the effects of eliminating single-point failure, improving security, and strong versatility

Active Publication Date: 2022-07-05
杭州泛链科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The common threshold signature scheme is suitable for the following scenarios: a certain right needs to be managed by n individuals, but for security reasons, it is impossible to obtain the right even if any (t-1) of them are required to communicate privately
However, such a solution cannot meet more complex equity management scenarios. For example, a certain equity needs to be managed by n organizations, and any (t-1) organizations can not obtain the equity if they are required to have private relationships; For security reasons, it is necessary to entrust the rights and interests representing the organization to m members for management, and any (u-1) members among them cannot obtain the rights and interests representing the organization
In addition, some existing threshold algorithms temporarily restore the main private key during the generation of the sub-private key or during the signing process, or require a trusted center, which greatly reduces the security of the entire scheme. needs to be optimized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A double threshold signature method based on ecdsa
  • A double threshold signature method based on ecdsa
  • A double threshold signature method based on ecdsa

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] The present invention will be described in detail below according to the accompanying drawings and preferred embodiments, and the objects and effects of the present invention will become more apparent. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0103] The ECDSA-based dual threshold signature method of the present invention is mainly composed of two parts: generating the parent public key and grandchild private key and synthesizing the signature. The first part corresponds to the initialization of the system, and the second part corresponds to the use of the system.

[0104] 1. Generate the parent public key and the grandchild private key (such as figure 1 shown)

[0105] In this process, (i, j) is used to represent a node, i represents the large group where the node is located, and j represents the serial number of the node in the large group, (α, β) is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses an ECDSA-based double threshold signature method, which splits an asymmetrically encrypted master private key into n groups, and each group has m grandchild private keys. In any t group, each group of any u private keys of the grandchildren can be electronically signed, and the result is the same as the result of directly signing with the master private key; If the number of keys is less than u, or the number of participating groups is less than t, the correct signature result will not be obtained. In addition, during the process of the scheme, no one will obtain the master private key of the system or the child private key representing any one group. Among them, n, m, t, and u are all self-defined parameters, and users can set them according to their own needs. The invention expands the application scenario of the single-layer threshold signature and increases the security.

Description

technical field [0001] The invention relates to the field of electronic information security, in particular to an ECDSA-based double threshold signature method. Background technique [0002] More and more Internet services are now based on electronic signatures of asymmetric encryption algorithms to verify user identity, such as the transfer of a certain amount of money. The common threshold signature scheme is suitable for the following scenarios: a certain right needs to be jointly managed by n individuals, but for security reasons, any (t-1) individuals are required to have private communication to obtain the right. However, such a scheme cannot satisfy more complex rights management scenarios. For example, a certain rights and interests need to be jointly managed by n organizations, and any (t-1) organizations cannot obtain the rights and interests; For security reasons, it is necessary to entrust the part of the rights and interests representing the organization to m m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0869H04L9/3255
Inventor 徐凡马聪
Owner 杭州泛链科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products