CN106533698A - RSA-based distributed threshold signature method and system - Google Patents
RSA-based distributed threshold signature method and system Download PDFInfo
- Publication number
- CN106533698A CN106533698A CN201611160582.5A CN201611160582A CN106533698A CN 106533698 A CN106533698 A CN 106533698A CN 201611160582 A CN201611160582 A CN 201611160582A CN 106533698 A CN106533698 A CN 106533698A
- Authority
- CN
- China
- Prior art keywords
- signature
- component
- private key
- components
- calculated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention relates to an RSA-based distributed threshold signature method and system. The method comprises the following steps of generating a private key component di corresponding to a signature end, wherein i is an element of a set [1, n], and n represents a quantity of all signature ends and is greater than or equal to 3; initiating signature, and obtaining a signature component si according to the private key component di; sending a signature request to other signature ends joining in signature; acquiring signature components generated by other signature ends joining in signature according to the signature request; and obtaining a complete signature s according to the signature components of all signature ends joining in signature. The RSA-based distributed threshold signature method and system provided by the present invention has advantages of being widely used, being high in security, and being easy to implement.
Description
Technical field
The present invention relates to information security field, more particularly to a kind of distributed Threshold Signature method and system based on RSA.
Background technology
Digital signature is the important part for ensureing RESEARCH OF CHAOS-BASED SECURITY COMMUNICATION, and current common digital signature scheme is logical
Intelligent code key storage key information is crossed, when signature is needed, is coordinated by middleware and is called intelligent code key to complete to sign
Name.
With the popularization of mobile Internet, increasing signature service progressively moves to mobile terminal, more user's choosings
Select by intelligent movable equipment to carry out business operation, but traditional intelligent code key be difficult to play a role in mobile terminal,
Mainly include following several respects reason:
1. intelligent code key is inconvenient to carry, and user needs to carry extra signature apparatus;
2. hardware interface cannot be docked, and mobile terminal cannot provide the interface of docking traditional intelligence cipher key;
3. middle unit development is difficult, and the middle unit development difficulty called for hardware is larger.
And existing digital signature technology usually needs the intervention of third party's certificate agency, the safety of signature is easily reduced
Property, therefore, how under the premise of ensureing user easily, there is provided can be used in the high security digital signature technology of mobile terminal,
It is the problem of urgent need to resolve instantly.
The content of the invention
The technical problem to be solved is for the deficiencies in the prior art, there is provided a kind of based on the distributed of RSA
Threshold Signature method and system, Threshold Signature are the popularizations to ordinary numbers signature, its difference with ordinary numbers signature
It is:Ordinary numbers signature is signed by signer complete independently, and Threshold Signature completes digital signature jointly by multiple members, and
And each member for signing mutually is unaware of to respective secret information.
The technical scheme that the present invention solves above-mentioned technical problem is as follows:
A kind of distributed Threshold Signature method based on RSA, comprises the following steps:
Step 1, generates private key component d corresponding with signature endi, i ∈ [1, n], n are all signature end quantity, n >=3;
Step 2, initiates signature, according to the private key component diObtain signature components si;
Step 3, the signature end to other participation signatures send signature request;
Step 4, obtains the signature components that other described signature ends for participating in signature are generated according to the signature request;
Step 5, obtains full signature s according to the signature components at the whole signature ends for participating in signature.
The invention has the beneficial effects as follows:A kind of distributed Threshold Signature method based on RSA that the present invention is provided, by pre-
The private key component at signature end is first generated, and after signature is initiated, participates in the signature end private key component respectively according to oneself of signature
Respective signature components are generated, signature components are integrated into into complete signature finally, improve the security of signature, signature process
It is simple and convenient, it is only necessary to which that interaction twice can just complete complete signature, by the flexible quantity and ginseng for arranging all signature ends
With the quantity at the signature end of signature, in that context it may be convenient to realize the even multi-party distributed signature of both sides, can thus support
Single server unit/terminal or the distributed signature of single server multiple terminals, while the present invention does not need third party's certificate agency
Intervention, is not in complete private key in signature process, further increases the security of signature, and the present invention has application wide
Advantage that is general, safe, being easily achieved.
On the basis of above-mentioned technical proposal, the present invention can also do following improvement.
Further, step 1 is specifically included:
Step 11, it is random to generate procatarxis subcomponent piAnd qi;
Step 12, according to procatarxis subcomponent piAnd qiIt is calculated component product N;
Step 13, carries out test for primality to component product N, if component product N is prime number, execution step
14, otherwise, execution step 11;
Step 14, according to procatarxis subcomponent piAnd qiIt is calculated the factor component of the rank of component product N
Step 15, randomly selects public key value e;
Step 16, by distributed detection, judge public key value e withIt is whether coprime, if coprime,
Execution step 17, otherwise, execution step 15, wherein,
Step 17, according to describedPrivate key component d is calculated with public key value ei, i ∈ [1, n], n is complete
Portion's signature end quantity, n >=3.
Using the beneficial effect of above-mentioned further scheme it is:By procatarxis subcomponent piAnd qiDescribed point is calculated directly
The factor component of the rank of amount product NAnd according toPrivate key is obtained by Distributed Calculation with public key value e
Component di, can avoid occurring complete private key d in signature process, further increase the safety of private key in signature process
Property.
Further, step 2 is specifically included:
Step 21, obtains signature request m0;
Step 22, according to the m0It is calculated signature request information m, m=h (m0), h is the Hash for meeting signature agreement
Function;
Step 23, according to signature request information m, the private key component diInstitute is calculated with component product N
State signature components s at signature endi。
Further, according to below equation, component product N is calculated by Secure Multi-party Computation Protocols are distributed:
The factor component of the rank of component product N is calculated according to below equation
As i=1,
Work as i>When 1,
Further, according to below equation, the private key component d is calculated by Secure Multi-party Computation Protocols are distributedi:
Wherein, ciFor Lagrange interpolation coefficient.
Further, signature components s are calculated according to below equationi:
Wherein, ciFor Lagrange interpolation coefficient.
Further, full signature s is calculated according to below equation:
Wherein, t is the signature end quantity for participating in signature.
Another kind of technical scheme that the present invention solves above-mentioned technical problem is as follows:
A kind of distributed Threshold Signature system based on RSA, including:N signature end, n >=3, the signature end include:
Registering modules, for generating private key component d corresponding with end of signingi, i ∈ [1, n];
Signature blocks, for initiating signature, according to the private key component diObtain signature components si, to other participation signatures
The signature end send signature request, obtain the label that other described signature ends for participating in signature are generated according to the signature request
Name component, obtains full signature s according to the signature components at the whole signature ends for participating in signature.
Further, the Registering modules are specifically included:
Signal generating unit, generates procatarxis subcomponent p for randomiAnd qi;
Computing unit, for according to procatarxis subcomponent piAnd qiComponent product N is calculated, and calculates the component
The factor component of the rank of product NAnd according toPrivate key component d is obtained with public key value ei, wherein,
Detector unit, for carrying out test for primality to component product N, if component product N is not prime number,
Perform signal generating unit, if component product N is prime number, perform computing unit calculate component product N rank because
Subcomponent
Unit is chosen, for randomly selecting public key value e;
Judging unit, for by distributed detection, judge public key value e with it is describedIt is whether coprime, such as
It is really coprime, then computing unit is performed according to describedPrivate key component d is calculated with public key value ei, otherwise, perform
Choose unit.
Further, the signature blocks are specifically included:
First signature unit, for initiating signature, according to the private key component diObtain signature components si;
Communication unit, for sending signature request to the signature end of other participation signatures, and obtains other participation label
The signature components that the signature end of name is generated according to the signature request;
Second signature unit, for obtaining full signature s according to the signature components at the whole signature ends for participating in signature.
The advantage of the additional aspect of the present invention will be set forth in part in the description, and partly will become from the following description
Obtain substantially, or recognized by present invention practice.
Description of the drawings
Fig. 1 is a kind of schematic flow sheet of distributed Threshold Signature method based on RSA provided in an embodiment of the present invention;
A kind of flow chart of distributed Threshold Signature method based on RSA that Fig. 2 is provided for another embodiment of the present invention;
A kind of structure chart of distributed Threshold Signature system based on RSA that Fig. 3 is provided for another embodiment of the present invention.
Specific embodiment
The principle and feature of the present invention are described below in conjunction with accompanying drawing, example is served only for explaining the present invention, and
It is non-for limiting the scope of the present invention.
As shown in figure 1, showing for a kind of flow process of the distributed Threshold Signature method based on RSA provided in an embodiment of the present invention
It is intended to, the distributed Threshold Signature method includes:
S101, generates private key component d corresponding with signature endi, i ∈ [1, n], n are all signature end quantity, n >=3;
S102, initiates signature, according to private key component diObtain signature components si;
S103, the signature end to other participation signatures send signature request;
S104, obtains the signature components that other signature ends for participating in signature are generated according to signature request;
S105, obtains full signature s according to the signature components at the whole signature ends for participating in signature.
A kind of distributed Threshold Signature method based on RSA provided in above-described embodiment, by previously generating signature end
Private key component, and after signature is initiated, the signature end for participating in signature generates respective label according to the private key component of oneself respectively
Signature components are finally integrated into complete signature, improve the security of signature by name component, and signature process is simple and convenient, only
Need to interact twice and can just complete complete signature, all quantity at signature end and the signature for participating in signature are set by flexible
The quantity at end, in that context it may be convenient to realize the even multi-party distributed signature of both sides, can thus support single server monohapto
End or the distributed signature of single server multiple terminals, and the intervention of third party's certificate agency is not needed, in signature process
Be not in complete private key, further increase the security of signature, above-described embodiment have be widely used, it is safe,
The advantage being easily achieved.
In another embodiment, as shown in Fig. 2 for another embodiment of the present invention provide it is a kind of based on the distributed of RSA
The flow chart of Threshold Signature method, including 5 signature ends, respectively A, B, C, D and E, initiate signature request by signature end A, sign
B and C participate in signature at name end, then the distributed Threshold Signature mode is comprised the following steps:
S201, signature end A generate procatarxis subcomponent p at randomiAnd qi;
S202, signature end A is according to procatarxis subcomponent piAnd qiIt is calculated component product N;
S203, signature end A carry out test for primality to component product N, if component product N is prime number, perform S204, no
Then, perform S201;
S204, signature end A is according to procatarxis subcomponent piAnd qiIt is calculated the factor component of the rank of component product N
S205, signature end A randomly select public key value e;
S206, signature end A by distributed detection, judge public key value e andIt is whether coprime, if coprime,
S207 is performed, otherwise, S205 is performed, wherein,
S207, signature end A according toPrivate key component d is calculated with public key value eA;
S208, signature end A generate signature request m0;
S209, signature end A is according to m0It is calculated signature request information m, m=h (m0), h is the Hash for meeting signature agreement
Function;
S210, signature end A is according to signature request information m, private key component dAThe label at signature end are calculated with component product N
Name component sA;
S211, signature end A send signature request information m to signature end B and signature end C;
S212, signature end B and signature end C generate signature components s according to signature request information m respectivelyBAnd sC;
S213, signature end A obtain sBAnd sC;
S214, signature end A is according to sA、sBAnd sCObtain full signature s.
Further, according to below equation, component product N is calculated by Secure Multi-party Computation Protocols are distributed:
The factor component of the rank of component product N is generated according to below equation
As i=1,
Work as i>When 1,
Further, according to below equation, by the distributed calculating private key component d of Secure Multi-party Computation ProtocolsA:
Wherein, cAFor Lagrange interpolation coefficient.
Further, signature components s are calculated according to below equationA:
Wherein, cAFor Lagrange interpolation coefficient.
Further, full signature s is calculated according to below equation:
In another embodiment, as shown in figure 3, for another embodiment of the present invention provide it is a kind of based on the distributed of RSA
The structure chart of Threshold Signature system, the distributed Threshold Signature system include:4 signature ends, the respectively first signature end 300,
Second signature end, the 3rd signature end and the 4th signature end, wherein, the first signature end 300 includes:
Registering modules 310, for generating private key component d corresponding with end of signing1;
Signature blocks 320, for initiating signature, according to private key component d1Obtain signature components s1, to other participation signatures
Signature end sends signature request, obtains the signature components that other signature ends for participating in signature are generated according to signature request, according to ginseng
Full signature s is obtained with the signature components at whole signature ends of signature.
Further, Registering modules 310 are specifically included:
Signal generating unit 311, generates procatarxis subcomponent p for randomiAnd qi;
Computing unit 312, for according to procatarxis subcomponent piAnd qiComponent product N is calculated, and calculates component product N
Rank factor componentAnd according toPrivate key component d is obtained with public key value ei, wherein,
Detector unit 313, for carrying out test for primality to component product N, if component product N is not prime number, performs
Signal generating unit 311, if component product N is prime number, performs the factor component that computing unit 312 calculates the rank of component product N
Unit 314 is chosen, for randomly selecting public key value e;
Judging unit 315, for by distributed detection, judge public key value e withIt is whether coprime, if mutually
Element, then perform 312 basis of computing unitPrivate key component d is calculated with public key value ei, otherwise, perform and choose unit
314。
Further, signature blocks 320 are specifically included:
First signature unit 321, for initiating signature, according to private key component d1Obtain signature components s1;
Communication unit 322, for sending signature request to the signature end of other participation signatures, and obtains other participation signatures
The signature components that generated according to signature request of signature end;
Second signature unit 323, for obtaining full signature s according to the signature components at the whole signature ends for participating in signature.
Those skilled in the art can be understood that, the second signature end, the 3rd signature end and the 4th signature end
Concrete structure with first signature end 300 it is identical, interconnect each other, for convenience of description and succinctly, here is no longer
Repeat.
Those skilled in the art can be understood that, for convenience of description and succinctly, the dress of foregoing description
The specific work process with unit is put, the corresponding process in preceding method embodiment is may be referred to, be will not be described here.
In several embodiments provided herein, it should be understood that disclosed system and method, which can be passed through
Its mode is realized.For example, system embodiment described above is only schematic, and for example, the division of module is only
A kind of division of logic function, can have when actually realizing other dividing mode, such as multiple modules or unit can with reference to or
Person is desirably integrated into another system, or some features can be ignored, or does not perform.In addition, it is shown or discussed it is mutual it
Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit
Connect, or electricity, machinery or other forms connections.
The foregoing is only presently preferred embodiments of the present invention, not to limit the present invention, all spirit in the present invention and
Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.
Claims (10)
1. a kind of distributed Threshold Signature method based on RSA, it is characterised in that comprise the following steps:
Step 1, generates private key component d corresponding with signature endi, i ∈ [1, n], n are all signature end quantity, n >=3;
Step 2, initiates signature, according to the private key component diObtain signature components si;
Step 3, the signature end to other participation signatures send signature request;
Step 4, obtains the signature components that other described signature ends for participating in signature are generated according to the signature request;
Step 5, obtains full signature s according to the signature components at the whole signature ends for participating in signature.
2. distributed Threshold Signature method according to claim 1, it is characterised in that step 1 is specifically included:
Step 11, it is random to generate procatarxis subcomponent piAnd qi;
Step 12, according to procatarxis subcomponent piAnd qiIt is calculated component product N;
Step 13, carries out test for primality to component product N, if component product N is prime number, execution step 14,
Otherwise, execution step 11;
Step 14, according to procatarxis subcomponent piAnd qiIt is calculated the factor component of the rank of component product N
Step 15, randomly selects public key value e;
Step 16, judge public key value e withWhether coprime, if coprime, execution step 17 otherwise, performs step
Rapid 15, wherein,
Step 17, according to describedPrivate key component d is calculated with public key value ei, i ∈ [1, n], n are all signatures
End quantity, n >=3.
3. distributed Threshold Signature method according to claim 2, it is characterised in that step 2 is specifically included:
Step 21, obtains signature request m0;
Step 22, according to the m0It is calculated signature request information m, m=h (m0), h is the hash function for meeting signature agreement;
Step 23, according to signature request information m, the private key component diThe signature is calculated with component product N
Signature components s at endi。
4. distributed Threshold Signature method according to claim 2, it is characterised in that according to below equation, by safety
In many ways calculate protocol distributed calculating component product N:
The factor component of the rank of component product N is calculated according to below equation
As i=1,
Work as i>When 1,
5. distributed Threshold Signature method according to claim 2, it is characterised in that according to below equation, by safety
In many ways calculate the protocol distributed calculating private key component di:
Wherein, ciFor Lagrange interpolation coefficient.
6. the distributed Threshold Signature method according to any one of claim 2 to 5, it is characterised in that according to below equation
Calculate signature components si:
Wherein, ciFor Lagrange interpolation coefficient.
7. distributed Threshold Signature method according to claim 6, it is characterised in that calculate described complete according to below equation
Whole signature s:
Wherein, t is the signature end quantity for participating in signature.
8. a kind of distributed Threshold Signature system based on RSA, it is characterised in that include:N signature end, n >=3, the signature
End includes:
Registering modules, for generating private key component d corresponding with end of signingi, i ∈ [1, n];
Signature blocks, for initiating signature, according to the private key component diObtain signature components si, to the institute of other participation signatures
State signature end and send signature request, obtain the signature point that other described signature ends for participating in signature are generated according to the signature request
Amount, obtains full signature s according to the signature components at the whole signature ends for participating in signature.
9. distributed Threshold Signature system according to claim 8, it is characterised in that the Registering modules are specifically included:
Signal generating unit, generates procatarxis subcomponent p for randomiAnd qi;
Computing unit, for according to procatarxis subcomponent piAnd qiComponent product N is calculated, and calculates component product N
Rank factor componentAnd according toPrivate key component d is obtained with public key value ei, wherein,
Detector unit, for carrying out test for primality to component product N, if component product N is not prime number, performs
Signal generating unit, if component product N is prime number, performs the Factor minute that computing unit calculates the rank of component product N
Amount
Unit is chosen, for randomly selecting public key value e;
Judging unit, for judge public key value e with it is describedIt is whether coprime, if coprime, perform computing unit
According to describedPrivate key component d is calculated with public key value ei, otherwise, perform and choose unit.
10. distributed Threshold Signature system according to claim 8, it is characterised in that the signature blocks are specifically included:
First signature unit, for initiating signature, according to the private key component diObtain signature components si;
Communication unit, for sending signature request to the signature end of other participation signatures, and obtains other participation signatures
The signature components that the signature end is generated according to the signature request;
Second signature unit, for obtaining full signature s according to the signature components at the whole signature ends for participating in signature.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611160582.5A CN106533698A (en) | 2016-12-15 | 2016-12-15 | RSA-based distributed threshold signature method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611160582.5A CN106533698A (en) | 2016-12-15 | 2016-12-15 | RSA-based distributed threshold signature method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106533698A true CN106533698A (en) | 2017-03-22 |
Family
ID=58339994
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611160582.5A Pending CN106533698A (en) | 2016-12-15 | 2016-12-15 | RSA-based distributed threshold signature method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106533698A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107017993A (en) * | 2017-04-01 | 2017-08-04 | 北京江南天安科技有限公司 | A kind of multi-party joint key is produced and digital signature method and system |
CN107294707A (en) * | 2017-06-22 | 2017-10-24 | 四川思安特科技有限公司 | A kind of cellphone shield signature key guard method |
CN107888385A (en) * | 2017-12-27 | 2018-04-06 | 数安时代科技股份有限公司 | RSA moduluses generation method, RSA key generation method, computer equipment and medium |
CN108768666A (en) * | 2018-07-04 | 2018-11-06 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of digital cash wallet management method based on SM2 threshold cryptography algorithms |
CN109272314A (en) * | 2018-08-14 | 2019-01-25 | 中国科学院数据与通信保护研究教育中心 | A kind of safety communicating method and system cooperateing with signature calculation based on two sides |
CN109743171A (en) * | 2018-12-06 | 2019-05-10 | 广州博士信息技术研究院有限公司 | It is a kind of to solve multiple party digital signatures, timestamp and the key series connection method of encryption |
CN109861816A (en) * | 2019-02-22 | 2019-06-07 | 矩阵元技术(深圳)有限公司 | Data processing method and device |
CN110113169A (en) * | 2019-04-15 | 2019-08-09 | 北京三未信安科技发展有限公司 | Cooperative digital endorsement method, device and electronic equipment based on RSA |
CN110311881A (en) * | 2018-03-27 | 2019-10-08 | 阿里健康信息技术有限公司 | A kind of authorization method, encryption method and terminal device |
WO2019200765A1 (en) * | 2018-04-16 | 2019-10-24 | 上海分赋信息科技有限公司 | System and corresponding method for realizing mapping of digital asset on mapping chain based on distributed technique |
CN110784320A (en) * | 2019-11-04 | 2020-02-11 | 张冰 | Distributed key implementation method and system and user identity management method and system |
WO2020168543A1 (en) * | 2019-02-22 | 2020-08-27 | 云图有限公司 | Data processing method and device |
CN111669275A (en) * | 2020-07-07 | 2020-09-15 | 广东工业大学 | Master-slave cooperative signature method capable of selecting slave nodes in wireless network environment |
CN113765657A (en) * | 2017-08-28 | 2021-12-07 | 创新先进技术有限公司 | Key data processing method and device and server |
CN116318728A (en) * | 2023-03-20 | 2023-06-23 | 中国科学院软件研究所 | Distributed certificate automatic issuing method, device and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130138962A1 (en) * | 2011-11-25 | 2013-05-30 | International Business Machines Corporation | Control method, program and system for link access |
CN104468476A (en) * | 2013-09-16 | 2015-03-25 | 华为终端有限公司 | Method and device for certificateless multi-proxy signature |
CN105813073A (en) * | 2014-12-30 | 2016-07-27 | 浙江高鸿电子技术有限公司 | Road side node verifiable threshold signature method based on vehicle-mounted short distance communication network |
-
2016
- 2016-12-15 CN CN201611160582.5A patent/CN106533698A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130138962A1 (en) * | 2011-11-25 | 2013-05-30 | International Business Machines Corporation | Control method, program and system for link access |
CN104468476A (en) * | 2013-09-16 | 2015-03-25 | 华为终端有限公司 | Method and device for certificateless multi-proxy signature |
CN105813073A (en) * | 2014-12-30 | 2016-07-27 | 浙江高鸿电子技术有限公司 | Road side node verifiable threshold signature method based on vehicle-mounted short distance communication network |
Non-Patent Citations (3)
Title |
---|
王海江: "秘密共享及其在数字签名中的应用研究", 《中国优秀硕士学位论文全文数据库》 * |
蒋瀚: "基于RSA密码体制的门限代理签名", 《计算机学报》 * |
许春香: "安全秘密共享及其应用研究", 《中国博士学位论文全文数据库》 * |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107017993B (en) * | 2017-04-01 | 2020-05-05 | 北京江南天安科技有限公司 | Multi-party combined key generation and digital signature method and system |
CN107017993A (en) * | 2017-04-01 | 2017-08-04 | 北京江南天安科技有限公司 | A kind of multi-party joint key is produced and digital signature method and system |
CN107294707A (en) * | 2017-06-22 | 2017-10-24 | 四川思安特科技有限公司 | A kind of cellphone shield signature key guard method |
CN113765657A (en) * | 2017-08-28 | 2021-12-07 | 创新先进技术有限公司 | Key data processing method and device and server |
CN113765657B (en) * | 2017-08-28 | 2023-10-24 | 创新先进技术有限公司 | Key data processing method, device and server |
CN107888385A (en) * | 2017-12-27 | 2018-04-06 | 数安时代科技股份有限公司 | RSA moduluses generation method, RSA key generation method, computer equipment and medium |
CN107888385B (en) * | 2017-12-27 | 2020-12-22 | 数安时代科技股份有限公司 | RSA modulus generation method, RSA key generation method, computer device, and medium |
CN110311881B (en) * | 2018-03-27 | 2022-01-14 | 阿里健康信息技术有限公司 | Authorization method, encryption method and terminal equipment |
CN110311881A (en) * | 2018-03-27 | 2019-10-08 | 阿里健康信息技术有限公司 | A kind of authorization method, encryption method and terminal device |
WO2019200765A1 (en) * | 2018-04-16 | 2019-10-24 | 上海分赋信息科技有限公司 | System and corresponding method for realizing mapping of digital asset on mapping chain based on distributed technique |
CN108768666A (en) * | 2018-07-04 | 2018-11-06 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of digital cash wallet management method based on SM2 threshold cryptography algorithms |
CN109272314B (en) * | 2018-08-14 | 2020-11-27 | 中国科学院数据与通信保护研究教育中心 | Secure communication method and system based on two-party collaborative signature calculation |
CN109272314A (en) * | 2018-08-14 | 2019-01-25 | 中国科学院数据与通信保护研究教育中心 | A kind of safety communicating method and system cooperateing with signature calculation based on two sides |
CN109743171A (en) * | 2018-12-06 | 2019-05-10 | 广州博士信息技术研究院有限公司 | It is a kind of to solve multiple party digital signatures, timestamp and the key series connection method of encryption |
WO2020168543A1 (en) * | 2019-02-22 | 2020-08-27 | 云图有限公司 | Data processing method and device |
CN109861816A (en) * | 2019-02-22 | 2019-06-07 | 矩阵元技术(深圳)有限公司 | Data processing method and device |
CN110113169B (en) * | 2019-04-15 | 2021-11-12 | 北京三未信安科技发展有限公司 | RSA-based collaborative digital signature method and device and electronic equipment |
CN110113169A (en) * | 2019-04-15 | 2019-08-09 | 北京三未信安科技发展有限公司 | Cooperative digital endorsement method, device and electronic equipment based on RSA |
CN110784320A (en) * | 2019-11-04 | 2020-02-11 | 张冰 | Distributed key implementation method and system and user identity management method and system |
CN111669275A (en) * | 2020-07-07 | 2020-09-15 | 广东工业大学 | Master-slave cooperative signature method capable of selecting slave nodes in wireless network environment |
CN111669275B (en) * | 2020-07-07 | 2023-04-07 | 广东工业大学 | Master-slave cooperative signature method capable of selecting slave nodes in wireless network environment |
CN116318728A (en) * | 2023-03-20 | 2023-06-23 | 中国科学院软件研究所 | Distributed certificate automatic issuing method, device and system |
CN116318728B (en) * | 2023-03-20 | 2024-03-26 | 中国科学院软件研究所 | Distributed certificate automatic issuing method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106533698A (en) | RSA-based distributed threshold signature method and system | |
CN106506170B (en) | A kind of distributed signature method and system based on RSA | |
CN111200502B (en) | Collaborative digital signature method and device | |
CN109714153B (en) | Efficient aggregated signature method | |
Goriparthi et al. | An improved bilinear pairing based remote user authentication scheme | |
CN107483209B (en) | Secure signcryption method based on heterogeneous system | |
CN107425971B (en) | Certificateless data encryption/decryption method and device and terminal | |
US20100281267A1 (en) | Image Processing Apparatus, Electronic Signature Generation System, Electronic Signature Key Generation Method, Image Processing Method, and Program | |
CN109861826B (en) | Method and device for realizing bidirectional proxy re-signature | |
CN107493165B (en) | Internet of vehicles authentication and key agreement method with strong anonymity | |
WO2019047418A1 (en) | Digital signature method, device and system | |
CN105515778B (en) | Cloud storage data integrity services signatures method | |
CN109462484B (en) | Broadcast advantage-combined identity-based security mutual authentication method | |
CN109981269A (en) | A kind of safe and efficient SM9 multi-party key distribution method and device | |
CN107733645B (en) | Encrypted communication authentication method and system | |
WO2022116176A1 (en) | Method and device for generating digital signature, and server | |
CN107147493B (en) | Digital signature method, device and system under limited resources | |
CN114285576B (en) | Non-opposite online and offline signcryption method | |
US20020044648A1 (en) | Methods and systems for efficient chained certification | |
CN113872767A (en) | Two-party collaborative signature method and device based on ECDSA algorithm | |
CN101645870A (en) | Method for exchanging secret key effectively and fairly | |
CN104917782A (en) | Decentralized charging settlement method in cloud computing environment | |
CN105049451B (en) | The method for generating the method and verification digital signature of digital signature | |
KR101601173B1 (en) | Method and server for revocable identity-based signature | |
CN116861390B (en) | Cross-block chain batch transaction authentication method and device based on aggregated signature |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Yang Guoqiang Inventor after: Bai Liantao Inventor after: Liu Huiyi Inventor before: Yang Guoqiang Inventor before: Liu Huiyi |
|
CB03 | Change of inventor or designer information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170322 |
|
RJ01 | Rejection of invention patent application after publication |