CN109274503B - Distributed collaborative signature method, distributed collaborative signature device and soft shield system - Google Patents

Distributed collaborative signature method, distributed collaborative signature device and soft shield system Download PDF

Info

Publication number
CN109274503B
CN109274503B CN201811308545.3A CN201811308545A CN109274503B CN 109274503 B CN109274503 B CN 109274503B CN 201811308545 A CN201811308545 A CN 201811308545A CN 109274503 B CN109274503 B CN 109274503B
Authority
CN
China
Prior art keywords
signature
random number
elliptic curve
key
calculating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811308545.3A
Other languages
Chinese (zh)
Other versions
CN109274503A (en
Inventor
罗燕京
刘鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xinchangcheng Technology Development Co ltd
Original Assignee
Beijing Renxinzheng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Renxinzheng Technology Co ltd filed Critical Beijing Renxinzheng Technology Co ltd
Priority to CN201811308545.3A priority Critical patent/CN109274503B/en
Publication of CN109274503A publication Critical patent/CN109274503A/en
Application granted granted Critical
Publication of CN109274503B publication Critical patent/CN109274503B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a distributed collaborative signature method, a distributed collaborative signature device and a soft shield system, wherein the distributed collaborative signature method comprises the following steps: generating a first random number and a second random number according to the stored elliptic curve parameters, calculating a plurality of segmentation keys and calculating a public key; the method comprises the steps of performing distributed storage on a plurality of split keys, and dividing the split keys into a first split key and a second split key according to a storage area; generating abstract hash according to the sending message, generating a first elliptic point according to the elliptic curve parameters, and calculating a first signature according to the abstract hash and the first elliptic point; encrypting the first signature according to the first segmentation key and the second segmentation key respectively, and calculating a second signature; and combining the first signature and the second signature to obtain a complete signature. The signature method, the signature device and the soft shield system generate the segmentation key and perform distributed storage on the two communication parties, so that the cooperative signature is realized, the two communication parties cannot acquire any information of the private key of the other party, and the security of the key is improved.

Description

Distributed collaborative signature method, distributed collaborative signature device and soft shield system
Technical Field
The invention relates to the field of digital signatures, in particular to a distributed collaborative signature method, a distributed collaborative signature device and a soft shield system.
Background
The security of the traditional financial service is generally realized by adopting a USB Key to store a digital certificate to solve the security problem, the USB Key is a hardware device with a USB interface, a single chip microcomputer or an intelligent card chip is arranged in the USB Key, a certain storage space is provided, a private Key and the digital certificate of a user can be stored, the authentication of the user identity is realized by utilizing a public Key algorithm arranged in the USB Key, and the USB Key is a generally-recognized and relatively-safe identity authentication technology.
The digital certificate is stored by relying on the USB Key hardware equipment, the terminal environment is complex and the resources are limited in the use scenes such as mobile interconnection, and the certificate and the algorithm provided by relying on the hardware equipment cannot be used or are limited. Therefore, virtual key devices are an industry trend.
At present, in the CPK system, the key is issued over the internet and stored in the memory, which is not secure.
Therefore, a distributed collaborative signature method, a distributed collaborative signature device and a soft shield system are provided.
Disclosure of Invention
In view of the above problems, the present invention is provided to provide a distributed collaborative signing method, a distributed collaborative signing apparatus, and a soft shield system, which overcome or at least partially solve the above problems, and generate a split key and perform distributed storage on both communication parties, and both parties jointly perform a signing operation on a message to implement collaborative signing, and both communication parties cannot acquire any information of the private key of the other party, so that an attacker cannot forge a signature when invading either party, thereby improving the security of the key.
According to an aspect of the present invention, there is provided a distributed collaborative signature method, including the steps of:
generating a first random number and a second random number according to the stored elliptic curve parameters, calculating a plurality of segmentation keys according to the first random number and the second random number, and calculating a public key according to the first random number and the elliptic curve parameters;
the method comprises the steps of performing distributed storage on a plurality of split keys, and dividing the split keys into a first split key and a second split key according to a storage area;
generating abstract hash according to the sending message, generating a first elliptic point according to the elliptic curve parameters, and calculating a first signature according to the abstract hash and the first elliptic point;
encrypting the first signature according to the first segmentation key, calculating a first intermediate value, encrypting the first intermediate value according to the second segmentation key, and calculating a second signature;
and combining the first signature and the second signature to obtain a complete signature so that the public key can verify the complete signature.
Further, the elliptic curve parameters include an elliptic curve over a finite field, a base point on the elliptic curve, and an order of the base point on the elliptic curve.
Further, the first random number and the second random number are generated according to the stored elliptic curve parameters, which are as follows:
D∈[1,n-1]
K∈[1,n-1]
wherein D is a first random number, K is a second random number, and n is the order of a base point on the elliptic curve;
calculating a public key according to the first random number and the elliptic curve parameter, which specifically comprises the following steps:
P=D[*]G
wherein, D is a first random number, G is a base point on the elliptic curve, P is a public key, and [ ] represents the elliptic curve point multiplication operation.
Further, the digest hash is generated according to the sending message, which specifically includes:
e=HASH(M′)
wherein e is the digest hash, M' is Z | | | M, Z is the identity, M is the message content, and | represents the concatenation.
Further, a first elliptic point is generated according to the elliptic curve parameters, which is as follows:
k1∈[1,n-1]
Q1=k1[*]G
wherein Q is1Is the first ellipsoid point, k1Is a third random number, n is the order of the base point on the elliptic curve, G is the base point on the elliptic curve [. sup. ]]Representing an elliptic curve point multiplication operation.
Further, a first signature is calculated according to the digest hash and the first ellipsoid, which is as follows:
Q1=(x1,y1)
r=(e+x1)mod n
where r is the first signature, Q1Is the first ellipsoid point, x1Is the abscissa, y, of the first ellipsoid point1Is the ordinate of the first ellipsoid point and e is the digest hash.
According to another aspect of the present invention, there is provided a distributed collaborative signing apparatus for implementing the above method, including:
the public and private key generation module is used for generating a first random number and a second random number according to the stored elliptic curve parameters, calculating a plurality of segmentation keys according to the first random number and the second random number, and calculating a public key according to the first random number and the elliptic curve parameters;
the key distribution storage module is used for carrying out distribution storage on the plurality of partition keys and dividing the partition keys into a first partition key and a second partition key according to a storage area;
the first signature calculation module is used for generating abstract hash according to the sending message, generating a first elliptic point according to the elliptic curve parameters and calculating a first signature according to the abstract hash and the first elliptic point;
the second signature calculation module is used for encrypting the first signature according to the first segmentation key, calculating a first intermediate value, encrypting the first intermediate value according to the second segmentation key and calculating a second signature;
and the complete signature generation module is used for combining the first signature and the second signature to obtain a complete signature so that the public key can verify the complete signature.
Further, the elliptic curve parameters in the public-private key generation module and the first signature calculation module include an elliptic curve over a finite field, a base point on the elliptic curve, and an order of the base point on the elliptic curve.
Further, the public and private key generating module comprises:
a split key calculation unit for generating a first random number and a second random number based on the stored elliptic curve parameters, and calculating a plurality of split keys based on the first random number and the second random number;
and the public key calculation unit is used for calculating a public key according to the first random number and the elliptic curve parameters.
According to another aspect of the invention, a soft shield system is provided, which includes the distributed collaborative signature apparatus.
Compared with the prior art, the invention has the following advantages:
the distributed collaborative signature method, the distributed collaborative signature device and the soft shield system generate the segmentation key and perform distributed storage on the two communication parties, the two parties jointly perform signature operation on the message to realize collaborative signature, and the two communication parties cannot acquire any information of the private key of the other party, so that an attacker cannot forge the signature under the condition that the attacker invades any one party, and the security of the key is improved.
Drawings
The invention is further illustrated by the following figures and examples.
FIG. 1 is a diagram of the distributed collaborative signing method steps of the present invention;
FIG. 2 is a flow diagram of an example key split of the present invention;
FIG. 3 is a flow diagram of an example distributed collaborative signature of the present invention;
fig. 4 is a block diagram of a distributed collaborative signing apparatus of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Fig. 1 is a diagram of steps of a distributed collaborative signature method according to the present invention, and as shown in fig. 1, the distributed collaborative signature method according to the present invention includes the following steps:
generating a first random number and a second random number according to the stored elliptic curve parameters, calculating a plurality of segmentation keys according to the first random number and the second random number, and calculating a public key according to the first random number and the elliptic curve parameters;
the method comprises the steps of performing distributed storage on a plurality of split keys, and dividing the split keys into a first split key and a second split key according to a storage area;
generating abstract hash according to the sending message, generating a first elliptic point according to the elliptic curve parameters, and calculating a first signature according to the abstract hash and the first elliptic point;
encrypting the first signature according to the first segmentation key, calculating a first intermediate value, encrypting the first intermediate value according to the second segmentation key, and calculating a second signature;
and combining the first signature and the second signature to obtain a complete signature so that the public key can verify the complete signature.
The elliptic curve parameters comprise an elliptic curve in a finite field, an upper base point of the elliptic curve and the order of the upper base point of the elliptic curve.
Further, the first random number and the second random number are generated according to the stored elliptic curve parameters, which are as follows:
D∈[1,n-1]
K∈[1,n-1]
wherein D is a first random number, K is a second random number, and n is the order of a base point on the elliptic curve;
calculating a public key according to the first random number and the elliptic curve parameter, which specifically comprises the following steps:
P=D[*]G
wherein, D is a first random number, G is a base point on the elliptic curve, P is a public key, and [ ] represents the elliptic curve point multiplication operation.
Further, the digest hash is generated according to the sending message, which specifically includes:
e=HASH(M′)
wherein e is the digest hash, M' is Z | | | M, Z is the identity, M is the message content, and | represents the concatenation.
Further, a first elliptic point is generated according to the elliptic curve parameters, which is as follows:
k1∈[1,n-1]
Q1=k1[*]G
wherein Q is1Is the first ellipsoid point, k1Is a third random number, n is the order of the base point on the elliptic curve, G is the base point on the elliptic curve [. sup. ]]Representing an elliptic curve point multiplication operation.
Further, a first signature is calculated according to the digest hash and the first ellipsoid, which is as follows:
Q1=(x1,y1)
r=(e+x1)mod n
where r is the first signature, Q1Is the first ellipsoid point, x1Is the abscissa, y, of the first ellipsoid point1Is the ordinate of the first ellipsoid point and e is the digest hash.
The distributed collaborative signing method generates the segmentation key and performs distributed storage on the two communication parties, the two parties jointly perform signing operation on the message to realize collaborative signing, and the two communication parties can not acquire any information of the private key of the other party, so that an attacker can not forge the signature under the condition of invading any one party, thereby improving the security of the key.
For simplicity of explanation, the method embodiments are described as a series of acts or combinations, but those skilled in the art will appreciate that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently with other steps in accordance with the embodiments of the invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
The distributed cooperative signature method can be applied to a soft shield system, the soft shield comprises a soft shield client and a soft shield background, wherein the soft shield background is designed in a layered mode and mainly comprises the following steps:
interface layer: providing an interface which is compatible with various operating systems and used for data encryption, digital signature, signature verification, key management, identity authentication and the like;
the safety technology comprises the following steps: providing security services for the soft shield through key protection such as key encryption and key dispersion, device fingerprinting and security reinforcement;
a file system: mainly for storing various sensitive data such as keys and digital certificates.
Fig. 2 is a flowchart of an example of key splitting according to the present invention, and as shown in fig. 2, fig. 2 is a flowchart illustrating a process of generating a split private key for both communication parties and calculating a public key.
Here, the transmitting side and the receiving side share the elliptic curve parameters E (Fq), G, and n of the SM2 algorithm, the elliptic curve E is an elliptic curve defined on the finite field Fq, G represents a base point of the order n on the elliptic curve E, and specific values and the like of each parameter are set in advance according to the secret SM2 algorithm.
The key segmentation comprises the following specific steps:
first, the sender generates a first random number as D. Namely:
D∈[1,n-1]
second, the sender generates two second random numbers as K, C. Namely:
K∈[1,n-1]
C∈[1,n-1]
thirdly, calculating and dividing the key, and respectively storing the key in different security areas, wherein the private key D is not separately stored, namely:
D1=[K*(1+D)]-1*C
D2=K*C
D3=G-1
D4=K*D
wherein, is the modular multiplication operation.
Fourth, computing public key
P=D[*]G
Wherein [ ] represents elliptic curve point multiplication operation.
In particular, the algorithm of the secret SM2 may be replaced by an ECC algorithm, a secret SM3 algorithm, and a secret SM4 algorithm.
Fig. 3 is a flowchart of the distributed collaborative signature of the present invention, and as shown in fig. 3, the distributed collaborative signature is specifically as follows:
firstly, the soft shield client splices Z and M to form M ', calculates HASH (M'), and takes the calculation result as e, wherein Z represents the common identity of the soft shield client and the soft shield background, M represents the message content, and HASH () represents the predetermined cryptographic HASH function. Namely, the method comprises the following steps:
M′=Z||M
wherein, | | represents concatenation; e ═ HASH (M').
Second, the soft shield client generates a third random number k1And calculate k1[*]G, using the calculation result as Q1And Q is1And e sending the background. Namely, the method comprises the following steps:
k1∈[1,n-1]
Q1=k1[*]G
thirdly, the soft shield client side is according to e and Q1The first part r of the signature is calculated.
Q1=(x1,y1)
r=(e+x1)mod n
Fourthly, the distributed storage of the split keys and the storage of the soft shield client terminal D1、D2Soft shield background storage D3、D4Then use D first1、D2Is calculated to obtain S1、S2
S1=D1*D2*k1
S2=D1*r
Fifthly, soft shield background reuse D3、D4And continuously calculating to obtain s:
s=S1*D3+S2*D4
sixthly, the signature value sign ═ r | | | s is finally obtained.
Seventhly, the signature verification party, namely the receiving party, uses the public key P to perform signature verification, and the specific algorithm is referred to part 2 of GM/T003.2-2012SM2 elliptic authority public key cryptographic algorithm: chapter 7 "verification algorithm and flow of digital signature" in digital signature algorithm ".
For example, the public key P is used for signature verification, which is as follows:
(1) checking whether r belongs to [1, n-1] or not, and if yes, verifying not to pass;
(2) checking whether s belongs to [1, n-1] or not, and if yes, verifying not to pass;
(3) device for placing
Figure BDA0001854350650000101
(4) Computing
Figure BDA0001854350650000102
(5) Calculating t ═ r + s; if t is 0, the verification is not passed;
(6) calculating the point (x) of the elliptic curve1,y1)=[s]G+[t]PA
(7) Calculating R ═ e + x1) mod n checks whether R is true, and if so, the verification is passed; otherwise, the verification is not passed.
Fig. 4 is a block diagram of a distributed collaborative signing apparatus according to the present invention, and as shown in fig. 4, the distributed collaborative signing apparatus according to the present invention includes:
the public and private key generation module is used for generating a first random number and a second random number according to the stored elliptic curve parameters, calculating a plurality of segmentation keys according to the first random number and the second random number, and calculating a public key according to the first random number and the elliptic curve parameters;
the key distribution storage module is used for carrying out distribution storage on the plurality of partition keys and dividing the partition keys into a first partition key and a second partition key according to a storage area;
the first signature calculation module is used for generating abstract hash according to the sending message, generating a first elliptic point according to the elliptic curve parameters and calculating a first signature according to the abstract hash and the first elliptic point;
the second signature calculation module is used for encrypting the first signature according to the first segmentation key, calculating a first intermediate value, encrypting the first intermediate value according to the second segmentation key and calculating a second signature;
and the complete signature generation module is used for combining the first signature and the second signature to obtain a complete signature so that the public key can verify the complete signature.
Further, the elliptic curve parameters in the public-private key generation module and the first signature calculation module include an elliptic curve over a finite field, a base point on the elliptic curve, and an order of the base point on the elliptic curve.
As shown in fig. 4, the public-private key generating module includes:
a split key calculation unit for generating a first random number and a second random number based on the stored elliptic curve parameters, and calculating a plurality of split keys based on the first random number and the second random number;
and the public key calculation unit is used for calculating a public key according to the first random number and the elliptic curve parameters.
As shown in fig. 4, the first signature calculation module includes:
a digest hash generation unit for generating a digest hash from the transmission message;
the first elliptic point generating unit is used for generating a first elliptic point according to the elliptic curve parameters;
and the first signature calculation unit is used for calculating a first signature according to the digest hash and the first elliptic point.
The distributed collaborative signing device generates the segmentation key and performs distributed storage on the two communication parties, the two parties jointly perform signing operation on the message to realize collaborative signing, and the two communication parties can not acquire any information of the private key of the other party, so that an attacker can not forge the signature under the condition of invading any one party, thereby improving the security of the key.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The soft shield system provided by the invention comprises the distributed cooperative signature device, specifically, the soft shield of the invention comprises a soft shield client and a soft shield background, one part of the distributed cooperative signature device is installed at the soft shield client, and the other part of the distributed cooperative signature device is installed at the soft shield background, wherein the soft shield background is designed in a layered manner and mainly comprises:
interface layer: providing an interface which is compatible with various operating systems and used for data encryption, digital signature, signature verification, key management, identity authentication and the like;
the safety technology comprises the following steps: providing security services for the soft shield through key protection such as key encryption and key dispersion, device fingerprinting and security reinforcement;
a file system: mainly for storing various sensitive data such as keys and digital certificates.
The soft shield provides security services such as trusted digital signature, identity authentication, encryption and decryption and the like of a terminal without a hardware medium, and provides cross-platform, reliable and uniform security services for mobile internet, internet of things and traditional internet.
The soft shield system generates the segmentation key and performs distributed storage on the two communication parties, the two parties jointly perform signature operation on the message to realize cooperative signature, and the two communication parties cannot acquire any information of the private key of the other party, so that an attacker cannot forge the signature under the condition that the attacker invades any one of the two parties, thereby improving the security of the key.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (5)

1. A distributed collaborative signature method is characterized by comprising the following steps:
generating a first random number and a second random number according to the stored elliptic curve parameters, calculating a plurality of segmentation keys according to the first random number and the second random number, and calculating a public key according to the first random number and the elliptic curve parameters;
the method comprises the steps of performing distributed storage on a plurality of split keys, and dividing the split keys into a first split key and a second split key according to a storage area;
generating abstract hash according to the sending message, generating a first elliptic point according to the elliptic curve parameters, and calculating a first signature according to the abstract hash and the first elliptic point;
encrypting the first signature according to the first segmentation key, calculating a first intermediate value, encrypting the first intermediate value according to the second segmentation key, and calculating a second signature;
combining the first signature and the second signature to obtain a complete signature for the public key to verify the complete signature;
the elliptic curve parameters comprise an elliptic curve in a finite field, a base point on the elliptic curve and the order of the base point on the elliptic curve;
generating a first random number and a second random number according to the stored elliptic curve parameters, which are as follows:
D∈[1,n-1]
K∈[1,n-1]
wherein D is a first random number, K is a second random number, and n is the order of a base point on the elliptic curve;
calculating a public key according to the first random number and the elliptic curve parameter, which specifically comprises the following steps:
P=D[*]G
wherein G is the base point on the elliptic curve, P is the public key, and [. sup. ] represents the point multiplication operation of the elliptic curve;
generating a digest hash according to the transmission message, specifically as follows:
e=HASH(M′)
wherein e is digest hash, M' is Z | | | M, Z is an identity, M is message content, and | represents concatenation;
generating a first elliptic point according to the elliptic curve parameters, which is as follows:
k1∈[1,n-1]
Q1=k1[*]G
wherein Q is1Is the first ellipsoid point, k1Is a third random number, G is a base point on the elliptic curve;
calculating a first signature according to the digest hash and the first ellipsoid, which comprises the following steps:
Q1=(x1,y1)
r=(e+X1)mod n
where r is the first signature, x1Is the abscissa, y, of the first ellipsoid point1Is the ordinate of the first ellipsoid point and e is the digest hash.
2. A distributed collaborative signing apparatus that implements the method of claim 1, comprising:
the public and private key generation module is used for generating a first random number and a second random number according to the stored elliptic curve parameters, calculating a plurality of segmentation keys according to the first random number and the second random number, and calculating a public key according to the first random number and the elliptic curve parameters;
the key distribution storage module is used for carrying out distribution storage on the plurality of partition keys and dividing the partition keys into a first partition key and a second partition key according to a storage area;
the first signature calculation module is used for generating abstract hash according to the sending message, generating a first elliptic point according to the elliptic curve parameters and calculating a first signature according to the abstract hash and the first elliptic point;
the second signature calculation module is used for encrypting the first signature according to the first segmentation key, calculating a first intermediate value, encrypting the first intermediate value according to the second segmentation key and calculating a second signature;
and the complete signature generation module is used for combining the first signature and the second signature to obtain a complete signature so that the public key can verify the complete signature.
3. The distributed cooperative signature device as claimed in claim 2, wherein the elliptic curve parameters in the public-private key generation module and the first signature calculation module include an elliptic curve over a finite field, a base point on the elliptic curve, and an order of the base point on the elliptic curve.
4. The distributed collaborative signing apparatus of claim 3, wherein the public-private key generation module comprises:
a split key calculation unit for generating a first random number and a second random number based on the stored elliptic curve parameters, and calculating a plurality of split keys based on the first random number and the second random number;
and the public key calculation unit is used for calculating a public key according to the first random number and the elliptic curve parameters.
5. A soft shield system comprising the distributed collaborative signing apparatus of claim 2.
CN201811308545.3A 2018-11-05 2018-11-05 Distributed collaborative signature method, distributed collaborative signature device and soft shield system Active CN109274503B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811308545.3A CN109274503B (en) 2018-11-05 2018-11-05 Distributed collaborative signature method, distributed collaborative signature device and soft shield system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811308545.3A CN109274503B (en) 2018-11-05 2018-11-05 Distributed collaborative signature method, distributed collaborative signature device and soft shield system

Publications (2)

Publication Number Publication Date
CN109274503A CN109274503A (en) 2019-01-25
CN109274503B true CN109274503B (en) 2022-01-04

Family

ID=65192774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811308545.3A Active CN109274503B (en) 2018-11-05 2018-11-05 Distributed collaborative signature method, distributed collaborative signature device and soft shield system

Country Status (1)

Country Link
CN (1) CN109274503B (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981592B (en) * 2019-02-28 2021-07-16 矩阵元技术(深圳)有限公司 Method and electronic equipment for generating key by combining multiple clients and multiple servers
CN109840426B (en) * 2019-03-05 2023-07-25 深圳市汇顶科技股份有限公司 Encryption method, encryption device and electronic equipment
CN109818730B (en) * 2019-03-06 2022-09-30 矩阵元技术(深圳)有限公司 Blind signature acquisition method and device and server
CN110069939A (en) * 2019-03-12 2019-07-30 平安科技(深圳)有限公司 Encryption data consistency desired result method, apparatus, computer equipment and storage medium
CN111695159B (en) * 2019-03-15 2023-04-07 阿里巴巴集团控股有限公司 Data processing method, device and equipment
CN110048839A (en) * 2019-04-26 2019-07-23 山东渔翁信息技术股份有限公司 A kind of digital signature method, device and storage medium
CN110224811B (en) * 2019-05-13 2022-05-06 中国联合网络通信集团有限公司 Internet of things encryption processing method, device and system
CN110457006B (en) * 2019-07-22 2021-08-06 上海朝夕网络技术有限公司 Distributed multi-party random number generation method and system based on hardware
CN112632630A (en) * 2019-10-08 2021-04-09 航天信息股份有限公司 SM 2-based collaborative signature calculation method and device
CN111010276A (en) * 2019-10-25 2020-04-14 武汉大学 Multi-party combined SM9 key generation and ciphertext decryption method and medium
CN112737783B (en) * 2019-10-28 2022-08-12 航天信息股份有限公司 Decryption method and device based on SM2 elliptic curve
WO2021127951A1 (en) * 2019-12-24 2021-07-01 云图技术有限公司 Method and device for generating two-party collaborative eddsa digital signature
CN111191263A (en) * 2019-12-30 2020-05-22 北京天威诚信电子商务服务有限公司 Pdf electronic signature method and system
CN111339545B (en) * 2020-03-20 2024-03-19 苏州链原信息科技有限公司 Method for generating data tag, electronic device and computer storage medium
CN111510299B (en) * 2020-04-10 2021-03-19 宁波富万信息科技有限公司 Joint digital signature generation method, electronic device, and computer-readable medium
CN111901102B (en) * 2020-06-28 2023-05-05 成都质数斯达克科技有限公司 Data transmission method, electronic device, and readable storage medium
CN111861474A (en) * 2020-08-04 2020-10-30 晋商博创(北京)科技有限公司 Transfer method based on CPK, user terminal and cloud server
CN112613882B (en) * 2020-12-29 2023-06-02 成都知道创宇信息技术有限公司 Distributed signature system and management method
CN112653554B (en) * 2020-12-30 2023-03-31 成都卫士通信息产业股份有限公司 Signature method, system, equipment and readable storage medium
CN112737778B (en) * 2020-12-30 2022-08-12 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Digital signature generation and verification method and device, electronic equipment and storage medium
CN114567448B (en) * 2022-04-29 2022-08-02 华南师范大学 Collaborative signature method and collaborative signature system
CN115442052B (en) * 2022-08-30 2023-06-23 云海链控股股份有限公司 Collaborative signature method, collaborative signature system, collaborative signature equipment and computer-readable storage medium
CN115314205B (en) * 2022-10-11 2023-01-03 中安网脉(北京)技术股份有限公司 Collaborative signature system and method based on key segmentation
CN115865348B (en) * 2023-02-09 2023-06-06 北京信安世纪科技股份有限公司 Data encryption method, homomorphic calculation method and equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243456A (en) * 2014-08-29 2014-12-24 中国科学院信息工程研究所 Signing and decrypting method and system applied to cloud computing and based on SM2 algorithm
CN107196763A (en) * 2017-07-06 2017-09-22 数安时代科技股份有限公司 SM2 algorithms collaboration signature and decryption method, device and system
CN107370599A (en) * 2017-08-07 2017-11-21 收付宝科技有限公司 A kind of management method, the device and system of remote destroying private key
CN107623570A (en) * 2017-11-03 2018-01-23 北京无字天书科技有限公司 A kind of SM2 endorsement methods based on addition Secret splitting
EP2947812B1 (en) * 2013-01-17 2018-03-14 Nippon Telegraph and Telephone Corporation Segmented secret-key storage system, segment storage apparatus segmented secret-key storage method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106685648B (en) * 2016-12-15 2018-08-03 北京三未信安科技发展有限公司 A kind of distributed signature method and system based on elliptic curve
CN108494551A (en) * 2018-03-16 2018-09-04 数安时代科技股份有限公司 Processing method, system, computer equipment and storage medium based on collaboration key

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2947812B1 (en) * 2013-01-17 2018-03-14 Nippon Telegraph and Telephone Corporation Segmented secret-key storage system, segment storage apparatus segmented secret-key storage method
CN104243456A (en) * 2014-08-29 2014-12-24 中国科学院信息工程研究所 Signing and decrypting method and system applied to cloud computing and based on SM2 algorithm
CN107196763A (en) * 2017-07-06 2017-09-22 数安时代科技股份有限公司 SM2 algorithms collaboration signature and decryption method, device and system
CN107370599A (en) * 2017-08-07 2017-11-21 收付宝科技有限公司 A kind of management method, the device and system of remote destroying private key
CN107623570A (en) * 2017-11-03 2018-01-23 北京无字天书科技有限公司 A kind of SM2 endorsement methods based on addition Secret splitting

Also Published As

Publication number Publication date
CN109274503A (en) 2019-01-25

Similar Documents

Publication Publication Date Title
CN109274503B (en) Distributed collaborative signature method, distributed collaborative signature device and soft shield system
US11323276B2 (en) Mutual authentication of confidential communication
EP3642997B1 (en) Secure communications providing forward secrecy
CN107483212B (en) Method for generating digital signature by cooperation of two parties
CN108199835B (en) Multi-party combined private key decryption method
CN107707358B (en) EC-KCDSA digital signature generation method and system
CA2543796C (en) Method and apparatus for verifiable generation of public keys
US9705683B2 (en) Verifiable implicit certificates
US9531540B2 (en) Secure token-based signature schemes using look-up tables
CN110971411B (en) SM2 homomorphic signature method for encrypting private key by multiplying based on SOTP technology
WO2005062919A2 (en) Public key encryption for groups
GB2487503A (en) Authentication of digital files and associated identities using biometric information
CN114726546B (en) Digital identity authentication method, device, equipment and storage medium
EP4144040A1 (en) Generating shared private keys
US20150006900A1 (en) Signature protocol
TW202318833A (en) Threshold signature scheme
WO2022050833A1 (en) Method for electronic signing and authenticaton strongly linked to the authenticator factors possession and knowledge
WO2023072502A1 (en) Generating shared keys
EP4385168A1 (en) Generating digital signature shares
CN114978488A (en) SM2 algorithm-based collaborative signature method and system
WO2023055371A1 (en) Replicated secret share generation for distributed symmetric cryptography
JPH11174957A (en) Authentication protocol
CN109787773B (en) Anti-quantum computation signcryption method and system based on private key pool and Elgamal
EP4024755B1 (en) Secured performance of an elliptic curve cryptographic process
CN109951287B (en) Anti-quantum computation signcryption method and system based on private key pool

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Luo Yanjing

Inventor after: Liu Peng

Inventor before: Luo Yanjing

GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: A1501, 15 / F, No. 22, Zhongguancun Street, Haidian District, Beijing 100089

Patentee after: Beijing xinchangcheng Technology Development Co.,Ltd.

Address before: 100080 room 1505, 15 / F, block B, 3 Haidian Street, Haidian District, Beijing

Patentee before: BEIJING RENXINZHENG TECHNOLOGY CO.,LTD.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231019

Address after: 610, Floor 6, Block A, No. 2, Lize Middle Second Road, Chaoyang District, Beijing 100102

Patentee after: Zhongguancun Technology Leasing Co.,Ltd.

Address before: A1501, 15 / F, No. 22, Zhongguancun Street, Haidian District, Beijing 100089

Patentee before: Beijing xinchangcheng Technology Development Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240130

Address after: A1501, 15 / F, No. 22, Zhongguancun Street, Haidian District, Beijing 100089

Patentee after: Beijing xinchangcheng Technology Development Co.,Ltd.

Country or region after: China

Address before: 610, Floor 6, Block A, No. 2, Lize Middle Second Road, Chaoyang District, Beijing 100102

Patentee before: Zhongguancun Technology Leasing Co.,Ltd.

Country or region before: China