CN109743166A - Multiple party signatures generation method and security information verification system - Google Patents

Multiple party signatures generation method and security information verification system Download PDF

Info

Publication number
CN109743166A
CN109743166A CN201811500619.3A CN201811500619A CN109743166A CN 109743166 A CN109743166 A CN 109743166A CN 201811500619 A CN201811500619 A CN 201811500619A CN 109743166 A CN109743166 A CN 109743166A
Authority
CN
China
Prior art keywords
party
signature
elliptic curve
private key
calculated result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811500619.3A
Other languages
Chinese (zh)
Other versions
CN109743166B (en
Inventor
顾青
梁佐泉
田文晋
冯四风
黄晟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Waterhouse Integrity Information Technology Co Ltd
Original Assignee
Waterhouse Integrity Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Waterhouse Integrity Information Technology Co Ltd filed Critical Waterhouse Integrity Information Technology Co Ltd
Priority to CN201811500619.3A priority Critical patent/CN109743166B/en
Publication of CN109743166A publication Critical patent/CN109743166A/en
Application granted granted Critical
Publication of CN109743166B publication Critical patent/CN109743166B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

It include: the first private key that first party generates itself the invention discloses a kind of multiple party signatures generation method for security information verification, second party generates the second private key of itself, third party generates the third private key of itself, first party treats signature information and carries out eap-message digest, summary data and first part's signature are generated, and summary data and first part's signature are sent to second party;Second party generates signature value according to summary data and first part's signature, and second part signature is generated according to the second private key, signature value and second part signature are sent to third party, third party generates Part III signature according to the second private key and Part IV is signed, and first party generates full signature according to the first private key, signature value, Part III signature and Part IV signature and exports.The present invention is based on SM2 algorithms to be not required to multiple interactive correspondence, requires network environment low, to interact suitable for low latency, less network environment.

Description

Multiple party signatures generation method and security information verification system
Technical field
The present invention relates to computer fields, more particularly to a kind of multiple party signatures generation method based on SM2 algorithm.This hair It is bright to further relate to a kind of security information verification system using the multiple party signatures generation method.
Background technique
Currently based on the security information verification of public key cryptography system be widely used in e-commerce, E-Government, In the application such as authentication.As the important tool to ensure information security, being widely utilized that for private key guarantees that these applications are safe Basis.
In order to ensure the safety of private key for user, the private key of user is usually to deposit in special cryptographic hardware, but this guarantor Deposit it is trans- there are still centainly by attack possibility, to crack system peace by stealing private key original text or stealing the private key right to use Entirely, it causes damages.
In order to improve the safety of private key, currently used technological means is that private key for user is passed through certain rule segmentation At more parts, then every one's share of expenses for a joint undertaking private key share is stored in different physical equipments, to avoid directly depositing for whole private key informations Storage and use.Such as the partition of private key exists in N number of varying environment again, only N number of member simultaneously cooperating could then without Method completes a private key operation.But to generally require multiple interactive correspondence frequent for the realization of above-mentioned private key cutting techniques means, no The demand for being able to satisfy low latency in current network environment, interacting less.The private key cutting techniques can not also be adapted for use with SM2 simultaneously The system that private key is digitally signed.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of there is greater security compared with prior art, is based on SM2 The multiple party signatures generation method of algorithm.
The present invention also provides a kind of security information verification systems using the multiple party signatures generation method.
In order to solve the above technical problems, the present invention is provided to the multiple party signatures generation methods of security information verification, including Following steps:
First party generates the first private key D of itself1
Second party generates the second private key D of itself2
Third party generates the third private key D of itself3
First party treats signature information M and carries out eap-message digest, generates summary data e and first part signature Q1, and will pluck Want data e and first part signature Q1It is sent to second party;
Second party is according to summary data e and first part signature Q1Signature value r is generated, and raw according to the second private key D2 At second part signature Q2
By signature value r and second part signature Q2It is sent to third party;
Third party is according to the second private key D2Generate Part III signature S1With Part IV signature S2
First party is according to the first private key D1, signature value r, Part III sign S1With Part IV signature S2It has generated Whole signature simultaneously exports.
It is further improved the multiple party signatures generation method, the first private key D1, the second private key D2And third Private key D3It is the random number in [1, n-1] section.
Wherein n is the elliptic curve parameter of SM2 algorithm, indicates elliptic curve point order of a group used in SM2 crypto-operation, Namely the rank of the basic point G of elliptic curve point group used in SM2 crypto-operation, n are prime number, subsequent n is stated thus.
It is further improved the multiple party signatures generation method, the first private key D1, the second private key D2With Three private key D3 meet following relationship, (1+D)-1=D1D2D3Modn, (1+D)-1Meet the mould n inverse of multiplication of 1+D, i.e. D =(D1D2D-1-1)modn。
It is further improved the multiple party signatures generation method, first party public-key cryptography, second party public-key cryptography and third party Public-key cryptography shares elliptic curve parameter E (Fq), G and the n of SM2 algorithm, and elliptic curve E is the ellipse being defined on finite field Fq Curve, G are a basic point of elliptic curve E, rank n.
It is further improved the multiple party signatures generation method, first party calculates the first private key D1Inverse element D on Fq1 -1Modn, and calculate D1 -1[*] G, by calculated result P1Public-key cryptography as first party;
Second party calculates the second private key D2Inverse element D on Fq2 -1Modn, and calculate D2 -1[*]P1, by calculated result P2Public-key cryptography as second party;
Third party calculates third private key D3Inverse element D on Fq3 -1Modn, and calculate D3 -1[*]P2, by calculated result P3As third-party public-key cryptography;
Calculate P3[-] G, using calculated result P as public-key cryptography;
Wherein, [*] indicates elliptic curve point multiplication operation, and [-] indicates that elliptic curve point subtracts operation.
Be further improved the multiple party signatures generation method, the first party generate message M to be signed summary data e and First part signature Q1Include:
First party calculates SM3Hash (M), and using calculated result as hash value e, wherein SM3Hash indicates to be pre-treated SM3 digest calculations;;
First party generates a random number K between [1, n-1]l, and calculate Kl[*] G, using calculated result as Q1, Wherein, [*] indicates elliptic curve point multiplication operation.
It is further improved the multiple party signatures generation method, second party generates a random number between [1, n-1] K2, and calculate K2[*] G, obtains calculated result Q2
It is further improved the multiple party signatures generation method, second party generates two random numbers between [1, n-1] k3And k4, and calculate k3[*]Q1Obtain calculated result Q3, calculate k4[*]Q2Obtain calculated result Q4, by Q3-Q4Obtain (x1, y1), And calculate (x1+ e) mod n, using calculated result as signature value r;
Wherein, [*] indicates elliptic curve point multiplication operation.
It is further improved the multiple party signatures generation method, if signature value r is not equal to 0, third party calculates D3*k3modn Using calculated result as D3S1, third party's calculating D3* rmodn is using calculated result as D3S2, third party's calculating D3*k4Modn will be counted Result is calculated as D3S3If D3S1、D3S2And D3S3Not equal to 0 and D3S1、D3S2And D3S3It is not mutually equal, then carries out subsequent calculating, it is no Then regenerate k3、k4And it recalculates;
Second party is according to D2、r、D3S1、D3S2And D3S3It generates and calculates D2S1And D2S2
Second party calculates D2*D3S1Modn is using calculated result as D2S1, second party calculating (D2*D3S2-D2*K2*D3S3) Modn is using calculated result as D2S2If D2S1And D2S2Not equal to 0 while D2S1It is unequal in D2S2, otherwise regenerate k2And it moves back It returns third party and recalculates D3S1、D3S2And D3S3
It is further improved the multiple party signatures generation method, first party is according to D1、r、D2S1、D2S2It generates and calculates complete Sign S;
First party calculates D1*K1*D2S1Modn, using calculated result as D1S1, first party calculating D1*D2S2Modn will be calculated As a result it is used as D1S2, first party calculating D1S1+D1S2- r is using calculated result as S;
If S is not equal to 1 not equal to 0 and (s+r) modn, first party exports (r, S) as full signature, otherwise again Generate k1And correlation step is recalculated.
Random number K in above-mentioned steps1、K2、K3It is positive integer
The present invention provides a kind of security information verification system using multiple party signatures generation method described in above-mentioned any one, Wherein, the security information verification system carries out signature verification using the multiple party signatures generation method.
Multiple party signatures generation method of the public affairs based on SM2 algorithm of the invention, it is multi-party to join by distinguishing storage section private key in many ways Conjunction could carry out signature or decryption oprerations to message, and communication parties can not get other side's private key and relevant information, and multi-party Private key is locally generated.It is logical not need repeatedly interaction for the multiple party signatures generation method based on SM2 algorithm through the invention News require network environment low, to interact suitable for low latency, less network environment.Also, the present invention can be suitable for being based on The system that SM2 private key is digitally signed.
Detailed description of the invention
Present invention will now be described in further detail with reference to the accompanying drawings and specific embodiments:
Fig. 1 is multiple party signatures generation method private key product process schematic diagram of the present invention.
Fig. 2 is multiple party signatures generation method signature product process schematic diagram of the present invention.
Specific embodiment
As shown in Figure 1, the present invention is provided to the multiple party signatures generation methods of security information verification, comprising the following steps:
First party generates the first private key D of itself1
Second party generates the second private key D of itself2
Third party generates the third private key D of itself3
The first private key D1, the second private key D2With third private key D3It is random in [1, n-1] section Number.
The first private key D1, the second private key D2Meet following relationship with third private key D3, (1+D)-1 =D1D2D3Modn, (1+D)-1Meet the mould n inverse of multiplication of 1+D, i.e. D=(D1D2D-1-1)modn。
First party treats signature information M and carries out eap-message digest, generates summary data e and first part signature Q1, and will pluck Want data e and first part signature Q1It is sent to second party;
Second party is according to summary data e and first part signature Q1Signature value r is generated, and raw according to the second private key D2 At second part signature Q2
By signature value r and second part signature Q2It is sent to third party;
Third party is according to the second private key D2Generate Part III signature S1With Part IV signature S2
First party is according to the first private key D1, signature value r, Part III sign S1With Part IV signature S2It has generated Whole signature simultaneously exports.
First party public-key cryptography, second party public-key cryptography and third party's public-key cryptography share the elliptic curve ginseng of SM2 algorithm Number E (Fq), G and n, elliptic curve E are the elliptic curve being defined on finite field Fq, and G is the basic point of n rank on elliptic curve E.
Wherein, public-key cryptography calculates in the following ways:
First party calculates the first private key D1Inverse element D on Fq1 -1Modn, and calculate D1 -1[*] G, by calculated result P1 Public-key cryptography as first party;
Second party calculates the second private key D2Inverse element D on Fq2 -1Modn, and calculate D2 -1[*]P1, by calculated result P2Public-key cryptography as second party;
Third party calculates third private key D3Inverse element D on Fq3 -1Modn, and calculate D3 -1[*]P2, by calculated result P3As third-party public-key cryptography;
Calculate P3[-] G, using calculated result P as public-key cryptography;
Wherein, [*] indicates elliptic curve point multiplication operation.
The first party generates the summary data e and first part signature Q of message M to be signed1Include:
First party calculates SM3Hash (M), using calculated result as hash value e;
First party generates a random number K between [1, n-1]l, and calculate Kl[*] G, using calculated result as Q1, Wherein, [*] indicates elliptic curve point multiplication operation.
Second party generates a random number K between [1, n-1]2, and calculate K2[*] G, obtains calculated result Q2
Second party generates two random number ks between [1, n-1]3And k4, and calculate k3[*]Q1Obtain calculated result Q3, calculate k4[*]Q2Obtain calculated result Q4, by Q3-Q4Obtain (x1, y1), and calculate (x1+ e) mod n, using calculated result as Signature value r;
Wherein, [*] indicates elliptic curve point multiplication operation.
If signature value r is not equal to 0, third party calculates D3*k3Modn is using calculated result as D3S1, third party's calculating D3* Rmodn is using calculated result as D3S2, third party's calculating D3*k4Modn is using calculated result as D3S3If D3S1、D3S2And D3S3No Equal to 0 and D3S1、D3S2And D3S3It is not mutually equal, then carries out subsequent calculating, otherwise regenerate k3、k4And it recalculates;
Second party is according to D2、r、D3S1、D3S2And D3S3It generates and calculates D1S1And D2S2
Second party calculates D2*D3S1Modn is using calculated result as D2S1, second party calculating (D2*D3S2-D2*K2*D3S3) Modn is using calculated result as D2S2If D2S1And D2S2Not equal to 0 and D2S1It is unequal in D2S2, otherwise regenerate k2And it retracts Third party recalculates D3S1、D3S2And D3S3
It is further improved the multiple party signatures generation method, first party is according to D1、r、D2S1、D2S2It generates and calculates complete Sign S;
First party calculates D1*K1*D2S1Modn, using calculated result as D1S1, first party calculating D1*D2S2Modn will be calculated As a result it is used as D1S2, first party calculating D1S1+D1S2- r is using calculated result as S;
If S is not equal to 1 not equal to 0 and (s+r) modn, first party exports (r, S) as full signature, otherwise again Generate k1And correlation step is recalculated.
Random number K in above-mentioned steps1、K2、K3It is positive integer.
The present invention provides a kind of security information verification system using multiple party signatures generation method described in above-mentioned any one, Wherein, the security information verification system carries out signature verification using the multiple party signatures generation method.
Above by specific embodiment and embodiment, invention is explained in detail, but these are not composition pair Limitation of the invention.Without departing from the principles of the present invention, those skilled in the art can also make many deformations and change Into these also should be regarded as protection scope of the present invention.

Claims (12)

1. a kind of multiple party signatures generation method is used for security information verification, which comprises the following steps:
First party generates the first private key D of itself1
Second party generates the second private key D of itself2
Third party generates the third private key D of itself3
First party treats signature information M and carries out eap-message digest, generates summary data e and first part signature Q1, and by summary data E and first part signature Q1It is sent to second party;
Second party is according to summary data e and first part signature Q1Signature value r is generated, and generates the according to the second private key D2 Sign Q for two parts2
By signature value r and second part signature Q2It is sent to third party;
Third party is according to the second private key D2Generate Part III signature S1With Part IV signature S2
First party is according to the first private key D1, signature value r, Part III sign S1With Part IV signature S2Generate complete label Name simultaneously exports.
2. multiple party signatures generation method as described in claim 1, it is characterised in that: the first private key D1, the second secret it is close Key D2With third private key D3It is the random number in [1, n-1] section;
Wherein n is the elliptic curve parameter of SM2 algorithm, indicates elliptic curve point order of a group used in SM2 crypto-operation, i.e., The rank of the basic point G of elliptic curve point group used in SM2 crypto-operation, n are prime number.
3. multiple party signatures generation method as claimed in claim 2, it is characterised in that: the first private key D1, the second secret Key D2Meet following relationship with third private key D3, (1+D)-1=D1D2D3Modn, (1+D)-1The mould n multiplication for meeting 1+D is inverse Operation, i.e. D=(D1D2D-1-1)modn。
4. multiple party signatures generation method as described in claim 1, it is characterised in that: first party public-key cryptography, second party disclose close Key and third party's public-key cryptography share elliptic curve parameter E (Fq), G and the n of SM2 algorithm, and elliptic curve E is to be defined on finite field Elliptic curve on Fq, G are a basic point of elliptic curve E, rank n;
Wherein n is the elliptic curve parameter of SM2 algorithm, indicates elliptic curve point order of a group used in SM2 crypto-operation, i.e., The rank of the basic point G of elliptic curve point group used in SM2 crypto-operation, n are prime number.
5. multiple party signatures generation method as claimed in claim 4, it is characterised in that:
First party calculates the first private key D1Inverse element D on Fq1 -1Modn, and calculate D1 -1[*] G, by calculated result P1As The public-key cryptography of first party;
Second party calculates the second private key D2Inverse element D on Fq2 -1Modn, and calculate P2=D2 -1[*]P1, by calculated result P2 Public-key cryptography as second party;
Third party calculates third private key D3Inverse element D on Fq3 -1Modn, and calculate P3=D3 -1[*]P2, by calculated result P3 As third-party public-key cryptography;
Calculate P3[-] G, using calculated result P as public-key cryptography;
Wherein, [*] indicates elliptic curve point multiplication operation, and [-] indicates that elliptic curve point subtracts operation.
6. multiple party signatures generation method as described in claim 1, it is characterised in that:
The first party generate message M to be signed summary data e and first part signature Q1 include:
First party calculates SM3 Hash (M), and using calculated result as hash value e, wherein SM3 Hash indicates SM3 to be pre-treated Digest calculations;
First party generates a random number K1 between [1, n-1], and calculates Kl[*] G, using calculated result as Q1, In, [*] indicates elliptic curve point multiplication operation;
N is the elliptic curve parameter of SM2 algorithm, indicates that elliptic curve point order of a group used in SM2 crypto-operation, i.e. SM2 are close The rank of the basic point G of elliptic curve point group used in code operation, n is prime number.
7. multiple party signatures generation method as described in claim 1, it is characterised in that:
Second party generates a random number K between [1, n-1]2, and calculate K2[*] G, obtains calculated result Q2
Wherein n is the elliptic curve parameter of SM2 algorithm, indicates elliptic curve point order of a group used in SM2 crypto-operation, i.e., The rank of the basic point G of elliptic curve point group used in SM2 crypto-operation, n are prime number.
8. multiple party signatures generation method as described in claim 1, it is characterised in that:
Second party generates two random number ks between [1, n-1]3And k4, and calculate k3[*]Q1Obtain calculated result Q3, meter Calculate k4[*]Q2Obtain calculated result Q4, by Q3-Q4Obtain (x1, y1), and calculate (x1+ e) modn, using calculated result as signature value r;
Wherein, [*] indicates elliptic curve point multiplication operation;
N is the elliptic curve parameter of SM2 algorithm, indicates that elliptic curve point order of a group used in SM2 crypto-operation, i.e. SM2 are close The rank of the basic point G of elliptic curve point group used in code operation, n is prime number.
9. multiple party signatures generation method as claimed in claim 8, it is characterised in that:
If signature value r is not equal to 0, third party calculates D3*k3Modn is using calculated result as D3S1, third party's calculating D3*rmodn Using calculated result as D3S2, third party's calculating D3*k4Modn is using calculated result as D3S3If D3S1、D3S2And D3S3Not equal to 0 And D3S1、D3S2And D3S3It is not mutually equal, then carries out subsequent calculating, otherwise regenerate k3、k4And it recalculates;
Second party is according to D2、r、D3S1、D3S2And D3S3It generates and calculates D1S1And D2S2
Second party calculates D2*D3S1Modn is using calculated result as D2S1, second party calculating (D2*D3S2-D2*K2*D3S3) modn general Calculated result is as D2S2If D2S1And D2S2Not equal to 0 and D2S1It is unequal in D2S2, otherwise regenerate k2And retract third Recalculate D in side3S1、D3S2And D3S3
10. multiple party signatures generation method as claimed in claim 9, it is characterised in that:
First party is according to D1、r、D2S1、D2S2It generates and calculates full signature S;
First party calculates D1*K1*D2S1Modn, using calculated result as D1S1, first party calculating D1*D2S2Modn is by calculated result As D1S2, first party calculating D1S1+D1S2- r is using calculated result as S;
If S is not equal to 1 not equal to 0 and (s+r) modn, first party exports (r, S) as full signature, otherwise regenerates k1And correlation step is recalculated.
11. multiple party signatures generation method as claimed in claim 10, it is characterised in that: random number K1、K2、K3It is positive integer.
12. a kind of security information verification system using multiple party signatures generation method described in claim 1-11 any one, Be characterized in that: the security information verification system carries out signature verification using the multiple party signatures generation method.
CN201811500619.3A 2018-12-10 2018-12-10 Multiparty signature generation method and security information verification system Active CN109743166B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811500619.3A CN109743166B (en) 2018-12-10 2018-12-10 Multiparty signature generation method and security information verification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811500619.3A CN109743166B (en) 2018-12-10 2018-12-10 Multiparty signature generation method and security information verification system

Publications (2)

Publication Number Publication Date
CN109743166A true CN109743166A (en) 2019-05-10
CN109743166B CN109743166B (en) 2023-06-23

Family

ID=66358713

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811500619.3A Active CN109743166B (en) 2018-12-10 2018-12-10 Multiparty signature generation method and security information verification system

Country Status (1)

Country Link
CN (1) CN109743166B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110943829A (en) * 2019-11-08 2020-03-31 中国电子科技网络信息安全有限公司 Method for generating SM2 signature by three-party cooperation
CN111010276A (en) * 2019-10-25 2020-04-14 武汉大学 Multi-party combined SM9 key generation and ciphertext decryption method and medium
CN111030801A (en) * 2019-10-25 2020-04-17 武汉大学 Multi-party distributed SM9 key generation and ciphertext decryption method and medium
CN113541926A (en) * 2020-04-14 2021-10-22 成都天瑞芯安科技有限公司 SM2 three-party joint signature method and system
CN114285577A (en) * 2021-04-27 2022-04-05 博雅中科(北京)信息技术有限公司 Multi-party collaborative signature method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140164765A1 (en) * 2011-05-13 2014-06-12 Telefonica, S.A. Procedure for a multiple digital signature
CN104243456A (en) * 2014-08-29 2014-12-24 中国科学院信息工程研究所 Signing and decrypting method and system applied to cloud computing and based on SM2 algorithm
CN107017993A (en) * 2017-04-01 2017-08-04 北京江南天安科技有限公司 A kind of multi-party joint key is produced and digital signature method and system
CN107483205A (en) * 2017-09-28 2017-12-15 武汉理工大学 The digital signature generation method and system of a kind of private key secret based on encryption
CN108809658A (en) * 2018-07-20 2018-11-13 武汉大学 A kind of digital signature method and system of the identity base based on SM2

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140164765A1 (en) * 2011-05-13 2014-06-12 Telefonica, S.A. Procedure for a multiple digital signature
CN104243456A (en) * 2014-08-29 2014-12-24 中国科学院信息工程研究所 Signing and decrypting method and system applied to cloud computing and based on SM2 algorithm
CN107017993A (en) * 2017-04-01 2017-08-04 北京江南天安科技有限公司 A kind of multi-party joint key is produced and digital signature method and system
CN107483205A (en) * 2017-09-28 2017-12-15 武汉理工大学 The digital signature generation method and system of a kind of private key secret based on encryption
CN108809658A (en) * 2018-07-20 2018-11-13 武汉大学 A kind of digital signature method and system of the identity base based on SM2

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111010276A (en) * 2019-10-25 2020-04-14 武汉大学 Multi-party combined SM9 key generation and ciphertext decryption method and medium
CN111030801A (en) * 2019-10-25 2020-04-17 武汉大学 Multi-party distributed SM9 key generation and ciphertext decryption method and medium
CN110943829A (en) * 2019-11-08 2020-03-31 中国电子科技网络信息安全有限公司 Method for generating SM2 signature by three-party cooperation
CN113541926A (en) * 2020-04-14 2021-10-22 成都天瑞芯安科技有限公司 SM2 three-party joint signature method and system
CN114285577A (en) * 2021-04-27 2022-04-05 博雅中科(北京)信息技术有限公司 Multi-party collaborative signature method and system

Also Published As

Publication number Publication date
CN109743166B (en) 2023-06-23

Similar Documents

Publication Publication Date Title
CN109743166A (en) Multiple party signatures generation method and security information verification system
CN109274503B (en) Distributed collaborative signature method, distributed collaborative signature device and soft shield system
CN104243456B (en) Suitable for signature of the cloud computing based on SM2 algorithms and decryption method and system
CN107483212B (en) Method for generating digital signature by cooperation of two parties
CN108667625B (en) Digital signature method of cooperative SM2
CN109873699B (en) Revocable identity public key encryption method
WO2013087629A1 (en) Group encryption methods and devices
EP4144040A1 (en) Generating shared private keys
Somani et al. An improved RSA cryptographic system
Raghunandan et al. Comparative analysis of encryption and decryption techniques using mersenne prime numbers and phony modulus to avoid factorization attack of RSA
Iavich et al. Comparison and hybrid implementation of blowfish, twofish and rsa cryptosystems
JP6053983B2 (en) Cryptographic system, signature system, cryptographic program and signature program
Amounas Elliptic curve digital signature algorithm using Boolean permutation based ECC
Shankar et al. Improved Multisignature Scheme for Authenticity of Digital Document in Digital Forensics Using Edward-Curve Digital Signature Algorithm
MATYSIAK Generalized RSA cipher and Diffie-Hellman protocol
CN109756335A (en) A kind of rank is the public key encryption decryption method of the finite field multiplier group of Mersenne Prime
CN112926074B (en) SM9 key thresholding generation method, device, equipment and storage medium
WO2023016729A1 (en) Generating digital signature shares
GB2612309A (en) Threshold signature scheme
GB2610560A (en) Generating shared cryptographic keys
GB2612310A (en) Generating shared keys
Biyashev et al. Development of the model of protected cross-border information interaction
Omono et al. Implicit Certificate Based Signcryption for a Secure Data Sharing in Clouds
Mathur et al. A Modified RSA Approach for Encrypting and Decrypting Text and Images Using Multi-Power, Multi Public Keys, Multi Prime Numbers and K-nearest Neighbor Algorithm
Albermany et al. RADG design On elliptic curve cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant