CN110351096A - Multi-signature method, signature center, medium and electronic equipment - Google Patents

Multi-signature method, signature center, medium and electronic equipment Download PDF

Info

Publication number
CN110351096A
CN110351096A CN201910671776.9A CN201910671776A CN110351096A CN 110351096 A CN110351096 A CN 110351096A CN 201910671776 A CN201910671776 A CN 201910671776A CN 110351096 A CN110351096 A CN 110351096A
Authority
CN
China
Prior art keywords
signature
participant
center
signed
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910671776.9A
Other languages
Chinese (zh)
Other versions
CN110351096B (en
Inventor
蒋福强
贾牧
张鹏程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910671776.9A priority Critical patent/CN110351096B/en
Publication of CN110351096A publication Critical patent/CN110351096A/en
Priority to PCT/CN2019/123094 priority patent/WO2021012574A1/en
Application granted granted Critical
Publication of CN110351096B publication Critical patent/CN110351096B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures

Abstract

This disclosure relates to field of information encryption, disclose a kind of multi-signature method, signature center, medium and electronic equipment, this method is executed by signature center, signature center includes signature unit and multiple signature participants, this method comprises: each signature participant obtains the Prime Orders cyclic group under elliptic curve equation;Participant of signing receives the private key that key generation centre is generated according to the mark of the signature participant;Signature participant obtains the public key of the signature participant based on the private key of the signature participant using formula;Each signature participant generates a random number, and signature unit is based on random number and obtains target random point using formula;Each signature participant is based on target random point and treats signature information signature according to formula respectively, and is sent to signature unit, is synthesized to obtain the signature of message to be signed by signature unit.Under the method, the safety of signature and the maintainability of signature system are improved, reduces resource consumption when multi-signature, the efficiency of the signature of raising.

Description

Multi-signature method, signature center, medium and electronic equipment
Technical field
This disclosure relates to technical field of information encryption, in particular to a kind of multi-signature method, signature center, medium and electricity Sub- equipment.
Background technique
Block chain operation when, in order to verify encryption Transaction Information safety, such as verification information integrality and The certainty of information generator's identity, it is often necessary to be carried out using signature algorithm.In order to further enhance the safety of signature, The scheme of multi-signature also starts to occur, under the prior art, the side for the multi-signature that block stream (blockstream) team proposes Case is mainly such that each signature participant arbitrarily takes an integer as private key, then utilizes the generation member in cyclic group The private key obtains corresponding public key, obtains the public key set of signature participant, is then based on public key set and each public key, counts Public key is calculated to promise to undertake;Each participant obtains a random number, obtained for each random number generate n ary operation at random for several times after Random point;For each signature participant, the binary operation result between each random point, message to be signed, signature are participated in The public key of side carries out Hash operation, then promises to undertake to operation result, public key and public key carries out binary operation, and calculate knot obtaining The random number that the signature participant is added on the basis of fruit, obtains the signature of the signature participant, finally will be between each random point Binary operation result and the signature of each signature participant connect and signed.
Drawback of the prior art is that be randomly generated due to the private key of signature participant, so its safety can not Control, it is also difficult to be systematically carried out maintenance, while the prior art needs to calculate public key promise, therefore the link needs a large amount of calculate Amount, will lead to signature inefficiency.
Summary of the invention
In technical field of information encryption, in order to solve or at least partly solve above-mentioned technical problem, the purpose of the disclosure It is to provide a kind of multi-signature method, signature center, medium and electronic equipment.
According to the one side of the application, a kind of multi-signature method is provided, the method is executed by signature center, described Signature center includes signature unit and multiple signature participants, which comprises
Each signature participant in signature center obtains the Prime Orders circulation established based on preset elliptic curve equation Group, the cyclic group include generating member, and the signature participant has mark;
Each signature participant in signature center receives key generation centre and is generated according to the mark of the signature participant Private key;
Each private key of the signature participant based on the signature participant in signature center obtains the label using following formula The public key of name participant:
Xi=g^xi,
Wherein, XiThe public key for i-th of signature participant for being, g are the generation member of the cyclic group, xiIt is i-th of label The private key of name participant;
When receiving the signature request for message to be signed, each signature participant in signature center generate one with Machine number, random number of the signature unit based on each signature participant in signature center is using following formula in the preset ellipse Target random point is obtained on curve:
Ri=g^ri,
R=R1*R2*…*Rn,
Wherein, RiIt is the random point obtained on the preset elliptic curve for i-th of signature participant, riIt is i-th The random number that a signature participant generates, R are the target random points that the random number based on each signature participant obtains;
Participant of respectively signing in signature center is based on the target random point and is utilized respectively following formula to described to be signed Message is signed, and the signature unit being sent in the signature center, and the signature unit synthesizes each signature participant Signature obtain the signature of the message to be signed:
si=ri+c*IDi*xi,
Wherein, IDiFor the mark of i-th of participant of signing, c=H (X, R, m), H are hash function, and m is described to be signed Message, X are the set of the public key of all signature participants in signature center, siIt is i-th of signature participant to described to be signed The signature that message carries out, the signature for the message to be signed that the signature unit synthesizes are (R, S), S=s1+s2+…+sn
According to the another aspect of the application, a kind of signature center, including signature unit and multiple signature participants are provided, The signature unit includes that target random point obtains module and synthesis module, and the signature participant includes obtaining module, receiving Module, public key acquisition module, generation module and signature blocks, in which:
Module is obtained, for obtaining the Prime Orders cyclic group established based on preset elliptic curve equation, the cyclic group Including generating member, the signature participant has mark;
Receiving module, the private key generated for receiving key generation centre according to the mark of the signature participant;
Public key acquisition module obtains the signature participant using following formula for the private key based on the signature participant Public key:
Xi=g^xi,
Wherein, XiThe public key for i-th of signature participant for being, g are the generation member of the cyclic group, xiIt is i-th of label The private key of name participant;
Generation module, for generating a random number when receiving the signature request for message to be signed;
Target random point obtains module, for the random number based on each signature participant using following formula described default Elliptic curve on obtain target random point:
Ri=g^ri,
R=R1*R2*…*Rn,
Wherein, RiIt is the random point obtained on the preset elliptic curve for i-th of signature participant, riIt is i-th The random number that a signature participant generates, R are the target random points that the random number based on each signature participant obtains;
Signature blocks sign the message to be signed for being utilized respectively following formula based on the target random point Name, and the signature unit being sent in the signature center:
si=ri+c*IDi*xi,
Wherein, IDiFor the mark of i-th of participant of signing, c=H (X, R, m), H are hash function, and m is described to be signed Message, X are the set of the public key of all signature participants in signature center, siIt is i-th of signature participant to described to be signed The signature that message carries out;
Synthesis module, the signature for synthesizing each signature participant obtain the signature (R, S) of the message to be signed, In, S=s1+s2+…+sn
According to the another aspect of the application, a kind of computer-readable program medium is provided, computer program is stored with Instruction makes computer execute foregoing method when the computer program instructions are computer-executed.
According to the another aspect of the application, a kind of electronic equipment is provided, the electronic equipment includes:
Processor;
Memory is stored with computer-readable instruction on the memory, and the computer-readable instruction is by the processing When device executes, foregoing method is realized.
The technical solution that the embodiment of the present invention provides can include the following benefits:
For multi-signature method provided by the present invention, the method is executed by signature center, pericardium in the signature Include signature unit and multiple signature participants, described method includes following steps: each signature participant in signature center obtains The Prime Orders cyclic group established based on preset elliptic curve equation is taken, the cyclic group includes generating member, and the signature participates in Side has mark;It is raw according to the mark of the signature participant that each signature participant in signature center receives key generation centre At private key;Each private key of the signature participant based on the signature participant in signature center obtains the label using following formula The public key of name participant:
Xi=g^xi,
Wherein, XiThe public key for i-th of signature participant for being, g are the generation member of the cyclic group, xiIt is i-th of label The private key of name participant;
When receiving the signature request for message to be signed, each signature participant in signature center generate one with Machine number, random number of the signature unit based on each signature participant in signature center is using following formula in the preset ellipse Target random point is obtained on curve:
Ri=g^ri,
R=R1*R2*…*Rn,
Wherein, RiIt is the random point obtained on the preset elliptic curve for i-th of signature participant, riIt is i-th The random number that a signature participant generates, R are the target random points that the random number based on each signature participant obtains;
Participant of respectively signing in signature center is based on the target random point and is utilized respectively following formula to described to be signed Message is signed, and the signature unit being sent in the signature center, and the signature unit synthesizes each signature participant Signature obtain the signature of the message to be signed:
si=ri+c*IDi*xi,
Wherein, IDiFor the mark of i-th of participant of signing, c=H (X, R, m), H are hash function, and m is described to be signed Message, X are the set of the public key of all signature participants in signature center, siIt is i-th of signature participant to described to be signed The signature that message carries out, the signature for the message to be signed that the signature unit synthesizes are (R, S), S=s1+s2+…+sn
Under the method, since the private key of each signature participant is mark next life of the key generation centre according to signature participant At, therefore can avoid passing through random fashion generation private key causes signature reliability to reduce the appearance of this phenomenon, improves The safety of signature and the maintainability of system, while the step for needing a large amount of computing resources is eliminated on the basis of existing technology Suddenly, the efficiency of the signature of raising.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited Invention.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of system architecture schematic diagram of multi-signature method shown according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of multi-signature method shown according to an exemplary embodiment;
Fig. 3 be the embodiment shown in corresponding embodiment according to fig. 2 step 230 after after step and step 260 The flow chart of step;
Fig. 4 is a kind of block diagram at signature center shown according to an exemplary embodiment;
Fig. 5 is a kind of electronic equipment example frame for realizing above-mentioned multi-signature method shown according to an exemplary embodiment Figure;
Fig. 6 is a kind of computer-readable storage for realizing above-mentioned multi-signature method shown according to an exemplary embodiment Medium.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
In addition, attached drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Identical attached drawing mark in figure Note indicates same or similar part, thus will omit repetition thereof.Some block diagrams shown in the drawings are function Energy entity, not necessarily must be corresponding with physically or logically independent entity.
The disclosure provides firstly a kind of multi-signature method.Signature generates the process of digital signature.Digital signature, Others the number of segment word string that can not forge for exactly only having the sender of information that could generate, this number of segment word string is also to letter simultaneously The sender of breath sends a valid certificates of information authenticity.Multi-signature, which refers to, needs multiple signature participants jointly one The signature completed is acted, each signature participant all plays certain effect in signature process.
Signature participant can be any equipment with operation and processing function, which can be with external equipment phase Even, for receiving or issuing information, portable mobile equipment, such as smart phone, tablet computer, notebook electricity be can be Brain, PDA (Personal Digital Assistant) etc., are also possible to fixed apparatus, for example, computer equipment, scene Terminal, desktop computer, server, work station etc. can also be that the set of multiple equipment, such as the physical basis of cloud computing are set It applies.
Preferably, signature participant can be server or computer equipment.
Fig. 1 is a kind of system architecture schematic diagram of multi-signature method shown according to an exemplary embodiment.With reference to Fig. 1 Shown, signature center 100 includes signature unit 110 and multiple signature participants 120, and multiple signature participants 120 can be with Signature unit 110 is communicated;Except center 100 of signing, there is also a key generation centre 130, key generation centres 130 can be communicated with the signature participant 120 in signature center 100.Participant 120 of signing has mark, center of signing It is raw according to the mark of each signature participant 120 that multiple signature participants 120 in 100 can receive key generation centre respectively At private key, participant 120 of then signing can use the private key and generates corresponding public key;Then, if signature center 100 receives To the signature request for treating signature information, each signature participant 120 in signature center 100 can generate a random number, sign The random number that name unit 110 can be generated for each signature participant 120 obtains a random point on preset elliptic curve, Then it is random the target being present on the preset elliptic curve to be obtained according to predetermined order progress binary operation to each random point Point, last signature unit 110 can be directed to each signature participant 120, first to it is all sign participants 120 public key set, Target random point, message to be identified carry out Hash operation, the mark of the result for then obtaining Hash operation and signature participant 120 Know and private key carries out the two-dimentional operation based on elliptic curve, and adds the signature participant on the basis of two-dimentional operation result 120 random numbers generated, obtain the signature of signature participant;Finally target random point and each signature participant 120 are completed Signature combination as the signature for finally obtaining message to be signed.
It is noted that Fig. 1 is only one embodiment of the disclosure, although in the embodiment in figure 1, each signature participates in Side 120 is desktop computer, and key generation centre 130 also is located at except signature center 100, but in practical applications, signature Participant 120 can be various types of terminals above-mentioned, and the inclusion relation at key generation centre 130 and signature center 100 can To be arbitrary, i.e., key generation centre 130 can be located at except signature center 100, can also be located at the interior of signature center 100 Portion, so the disclosure is not construed as limiting this, therefore the protection scope of the disclosure also should not be any way limited.
Fig. 2 is a kind of flow chart of multi-signature method shown according to an exemplary embodiment.Wherein, Fig. 2 embodiment The method shown is executed by signature center, and signature center includes signature unit and multiple signature participants, as shown in Fig. 2, including Following steps:
Step 210, each signature participant in signature center obtains the element established based on preset elliptic curve equation Number rank cyclic group.
The cyclic group includes generating member, and the signature participant has mark.
Signature center is the system for including multiple units or module, including signature unit and multiple signatures join It is organically combined in signature center with side, signature unit can occur mutually to interconnect each other with signature participant System or effect.Signature center can be the entirety that software, hardware and firmware combine.
In practical applications, signature participant can be module, can be with a terminal, it might even be possible to be one individually system System or subsystem.
Group is a concept in the group theory, and a group is to meet closure, associative law, identical element exist, inverse element exists etc. The nonempty set of condition, a unit in a group are known as an element in group, and order of a group is the number of element in group, is followed Ring group is the group for meeting such condition: each element is all the power of a fixed element in group in group, therefore the cyclic group Generation member be the fixed element, and Prime Orders cyclic group be include element number be prime number cyclic group.
In one embodiment, the general formula of the preset elliptic curve equation are as follows:
Y^2=x^3+a*x+b (mod p),
Wherein, a and b is the coefficient of the preset elliptic curve equation, and p is modulus.
General elliptic curve equation can use above-mentioned form, for example may is that
y2=x3-5x+4(mod 25)。
All the points in elliptic curve constitute a module, so the prime number established based on preset elliptic curve equation Each element in rank cyclic group is all a point.
In one embodiment, the set of all the points composition of preset elliptic curve equation will be met as the element established Number rank cyclic group.
Based on the add operation that the process that preset elliptic curve equation establishes Prime Orders cyclic group is using elliptic curve Rule is established.
The mark of signature participant is the character string for uniquely determining signature participant identity, wherein may include word The characters such as mother, number, underscore, for example can be MAC Address (Media Access Control Address, media control Access address), cell-phone number, bank's card number, in advance for it is each signature participant distribution account or ID (Identification, sequence number) etc..
In one embodiment, the type of mark of participant of respectively signing in the signature center is identical, the label The type of the mark of name participant is identification card number, cell-phone number, one in email address.
Step 220, each signature participant in signature center receives key generation centre according to the signature participant Identify the private key generated.
Private key is the key in asymmetric encryption field for encryption, and the information being encrypted by private key can only use corresponding public key Decryption.
In one embodiment, mark of the key generation centre in the following way according to each signature participant is raw At private key:
The key generation centre utilizes the hash algorithm specific to the key generation centre to each signature participant Mark carries out Hash operation, obtains the private key of each signature participant.
In one embodiment, mark of the key generation centre in the following way according to each signature participant is raw At private key:
The key generation centre encrypts the mark of each signature participant using the private key of itself, obtains each The private key of signature participant.
In one embodiment, mark of the key generation centre in the following way according to each signature participant is raw At private key:
The key generation centre is directed to each signature participant, generates corresponding with the mark of the signature participant random Private key of the character string as the signature participant, and the private key generated for each signature participant is participated in corresponding signature The corresponding storage of the mark of side.
In one embodiment, the mark of all signature participants is all generated by key generation centre, and is generated by key Central service.
In one embodiment, each signature participant in signature center receives key generation centre according to the signature Before the private key that the mark of participant generates, the method also includes:
Each signature in signature center participates in the mark that direction key generation centre sends the signature participant, so as to close Key generates center and generates private key according to the mark of the signature participant.
In one embodiment, key generation centre is embedded with script in local terminal (i.e. signature center), in signature center Before each signature participant receives private key of the key generation centre according to the mark generation of the signature participant, in key generation The heart crawls the mark of the signature participant in signature center using script, and is generated and corresponded to according to the mark of each signature participant Private key.
Step 230, each signature participant in signature center utilizes following formula based on the private key of the signature participant Obtain the public key of the signature participant:
Xi=g^xi,
Wherein, XiThe public key for i-th of signature participant for being, g are the generation member of the cyclic group, xiIt is i-th of label The private key of name participant.
As can be seen that the public key of each signature participant is carried out on given number subelliptic curve to the generation member Binary operation obtain, wherein it is described to generate the initial point that member is elliptic curve, and the given number be equal to it is corresponding The private key of signature participant.
Step 250, when receiving the signature request for message to be signed, each signature participant in signature center is raw At a random number, random number of the signature unit based on each signature participant in signature center is using following formula described pre- If elliptic curve on obtain target random point:
Ri=g^ri,
R=R1*R2*…*Rn,
Wherein, RiIt is the random point obtained on the preset elliptic curve for i-th of signature participant, riIt is i-th The random number that a signature participant generates, R are the target random points that the random number based on each signature participant obtains.
In one embodiment, the random number that each signature participant generates is greater than 0 and is less than the order of the cyclic group.
It can be the network request based on various agreements for the signature request of message to be signed, for example can be HTTP association Request under view.
It in one embodiment, include message to be signed in the signature request.
In one embodiment, before receiving the signature request for message to be signed, in the signature center Signature unit obtains multiple message to be signed, wherein each message to be signed has mark, asks for the signature of message to be signed It include the mark of message to be signed in asking, then when receiving the signature request for message to be signed, in the signature center Signature unit obtained in the multiple message to be signed mark with the signature request in include message to be signed mark Know identical message to be signed.
Step 260, participant of respectively signing in signature center is based on the target random point and is utilized respectively following formula to institute The signature unit stating message to be signed to sign, and being sent in the signature center, the signature unit synthesize each label The signature of name participant obtains the signature of the message to be signed:
si=ri+c*IDi*xi,
Wherein, IDiFor the mark of i-th of participant of signing, c=H (X, R, m), H are hash function, and m is described to be signed Message, X are the set of the public key of all signature participants in signature center, siIt is i-th of signature participant to described to be signed The signature that message carries out, the signature for the message to be signed that the signature unit synthesizes are (R, S), S=s1+s2+…+sn
As can be seen that the signature of the message to be signed finally synthesized and private key, each signature participant mark, Public key, target random point and the message Multiple factors to be signed of each signature participant are related, and which improves answering for signature Miscellaneous degree, and then improve the reliability and safety of signature.
In conclusion implementing the multi-signature method exemplified according to fig. 2, since the private key of each signature participant is key Generation center is generated according to the mark of signature participant, therefore can be avoided passing through random fashion and generated private key and cause to sign Reliability reduces the appearance of this phenomenon, either the private key of signature participant still finally obtained message to be signed itself It signs all related with each signature mark of participant, improves the safety of signature and the maintainability of system, while existing Have and eliminate the step of needing a large amount of computing resources on the basis of technology, has saved resource, the efficiency of the signature of raising.
Fig. 3 be the embodiment shown in corresponding embodiment according to fig. 2 step 230 after after step and step 260 The flow chart of step.As shown in Figure 3, comprising the following steps:
Step 240, each signature participant in signature center announces the public key of the signature participant, so that signature is tested Card can obtain the public key set being made of the public key of all signature participants in signature center.
In one embodiment, signature participant announces its public key by mode disclosed in network.For example, signature participant Public key is added to preset web page code template, the web page files of record public key are generated and is stored in local;Work as signature verification When side's needs obtain the public key for participant of signing, public key acquisition being sent to participant of signing and is requested, signature participant meeting basis should It requests to return to the web page files comprising public key to signature verification side, so that signature verification side be allow to obtain from the web page files Public key, signature verification side is requested by sending public key acquisition to each signature participant, to obtain public key set.
In one embodiment, after all signature participants in signature center generate public key, by signature center by public key Set is packaged and has each signature verification side of communication connection to send to establishing therewith, so that signature verification side be allow to obtain public affairs Key.
Signature verification side is the entity with calculation process and communication capacity, and can be with signature participant is same class The terminal or system of type.
Step 270, the signature unit in signature center is sent described to the message to be signed to Target Signature authentication The signature of progress, so that the Target Signature authentication carries out sign test to the message to be signed using the public key set.
Target Signature authentication is the qualified side that sign test is carried out to the signature of the message to be signed.
In one embodiment, Target Signature authentication has mark, and is stored in signature unit local, when signature center In signature unit receive the request for obtaining the signature of message to be signed, if the mark in the request and to be stored in signature single Mark in first local is consistent, then is sent and described carried out to the message to be signed to the sender of the request according to the request Signature.
In one embodiment, it states Target Signature authentication and is based on following formula to described wait sign using the public key set Name message carries out sign test:
G^S=R* (X1^ID1+…+Xn^IDn)*c。
Wherein, g is the generation member of the cyclic group, and R is that the target that the random number based on each signature participant obtains is random Point, S=s1+s2+…+sn, XiThe public key for i-th of signature participant for being, IDiFor the mark of i-th of participant of signing, c =H (X, R, m), H are hash function, and m is the message to be signed, and X is the public key of all signature participants in signature center Set.
The disclosure additionally provides a kind of signature center, and Fig. 4 is a kind of signature center shown according to an exemplary embodiment Block diagram.As shown in figure 4, signature center 400 includes signature unit 420 and multiple signature participants 410, the signature unit 420 include that target random point obtains module 421 and synthesis module 422, and the signature participant 410 includes obtaining module 411, connecing Receive module 412, public key acquisition module 413, generation module 414 and signature blocks 415, in which:
Module 411 is obtained, for obtaining the Prime Orders cyclic group established based on preset elliptic curve equation, the circulation Group includes generating member, and the signature participant has mark;
Receiving module 412, the private key generated for receiving key generation centre according to the mark of the signature participant;
Public key acquisition module 413 obtains the signature using following formula for the private key based on the signature participant and participates in The public key of side:
Xi=g^xi,
Wherein, XiThe public key for i-th of signature participant for being, g are the generation member of the cyclic group, xiIt is i-th of label The private key of name participant;
Generation module 414, for generating a random number when receiving the signature request for message to be signed;
Target random point obtains module 421, for the random number based on each signature participant using following formula described Target random point is obtained on preset elliptic curve:
Ri=g^ri,
R=R1*R2*…*Rn,
Wherein, RiIt is the random point obtained on the preset elliptic curve for i-th of signature participant, riIt is i-th The random number that a signature participant generates, R are the target random points that the random number based on each signature participant obtains;
Signature blocks 415, for based on the target random point be utilized respectively following formula to the message to be signed into Row signature, and the signature unit being sent in the signature center:
si=ri+c*IDi*xi,
Wherein, IDiFor the mark of i-th of participant of signing, c=H (X, R, m), H are hash function, and m is described to be signed Message, X are the set of the public key of all signature participants in signature center, siIt is i-th of signature participant to described to be signed The signature that message carries out;
Synthesis module 422, for synthesize it is each signature participant signature obtain the message to be signed signature (R, S), wherein S=s1+s2+…+sn
According to the third aspect of the disclosure, a kind of electronic equipment that can be realized the above method is additionally provided.
Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or Program product.Therefore, various aspects of the invention can be embodied in the following forms, it may be assumed that complete hardware embodiment, complete The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here Referred to as circuit, " module " or " system ".
The electronic equipment 500 of this embodiment according to the present invention is described referring to Fig. 5.The electronics that Fig. 5 is shown Equipment 500 is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.
As shown in figure 5, electronic equipment 500 is showed in the form of universal computing device.The component of electronic equipment 500 can wrap It includes but is not limited to: at least one above-mentioned processing unit 510, at least one above-mentioned storage unit 520, the different system components of connection The bus 530 of (including storage unit 520 and processing unit 510).
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 510 Row, so that various according to the present invention described in the execution of the processing unit 510 above-mentioned " embodiment method " part of this specification The step of illustrative embodiments.
Storage unit 520 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit (RAM) 521 and/or cache memory unit 522, it can further include read-only memory unit (ROM) 523.
Storage unit 520 can also include program/utility 524 with one group of (at least one) program module 525, Such program module 525 includes but is not limited to: operating system, one or more application program, other program modules and It may include the realization of network environment in program data, each of these examples or certain combination.
Bus 530 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 500 can also be with one or more external equipments 700 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 500 communicate, and/or with make Any equipment (such as the router, modulation /demodulation that the electronic equipment 500 can be communicated with one or more of the other calculating equipment Device etc.) communication.This communication can be carried out by input/output (I/O) interface 550.Also, electronic equipment 500 can be with By network adapter 560 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, Such as internet) communication.As shown, network adapter 560 is communicated by bus 530 with other modules of electronic equipment 500. It should be understood that although not shown in the drawings, other hardware and/or software module can not used in conjunction with electronic equipment 500, including but not Be limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and Data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment Method.
According to the fourth aspect of the disclosure, a kind of computer readable storage medium is additionally provided, being stored thereon with can be real The program product of existing this specification above method.In some possible embodiments, various aspects of the invention can also be real It is now a kind of form of program product comprising program code, when described program product is run on the terminal device, the journey Sequence code is each according to the present invention described in above-mentioned " illustrative methods " part of this specification for executing the terminal device The step of kind illustrative embodiments.
Refering to what is shown in Fig. 6, describing the program product for realizing the above method of embodiment according to the present invention 600, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device, Such as it is run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can be with To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, In carry readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal, Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing Matter, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or and its The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have Line, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages Code, described program design language include object oriented program language-Java, C++ etc., further include conventional mistake Formula programming language-such as " C " language or similar programming language.Program code can be calculated fully in user It executes in equipment, partly execute on a user device, executing, as an independent software package partially in user calculating equipment Upper part executes on a remote computing or executes in remote computing device or server completely.It is being related to remotely counting In the situation for calculating equipment, remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
In addition, above-mentioned attached drawing is only the schematic theory of processing included by method according to an exemplary embodiment of the present invention It is bright, rather than limit purpose.It can be readily appreciated that the time that above-mentioned processing shown in the drawings did not indicated or limited these processing is suitable Sequence.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and change can executed without departing from the scope.The scope of the present invention is limited only by the attached claims.

Claims (10)

1. a kind of multi-signature method, which is characterized in that the method is executed by signature center, and the signature center includes signature Unit and multiple signature participants, which comprises
Each signature participant in signature center obtains the Prime Orders cyclic group established based on preset elliptic curve equation, institute Stating cyclic group includes generating member, and the signature participant has mark;
Each signature participant in signature center receives the private that key generation centre is generated according to the mark of the signature participant Key;
Each private key of the signature participant based on the signature participant in signature center, which obtains the signature using following formula, joins With side public key:
Xi=g^xi,
Wherein, XiThe public key for i-th of signature participant for being, g are the generation member of the cyclic group, xiIt is i-th of signature ginseng With the private key of side;
When receiving the signature request for message to be signed, each signature participant in signature center generates one at random It counts, random number of the signature unit in signature center based on each signature participant is using following formula described preset oval bent Target random point is obtained on line:
Ri=g^ri,
R=R1*R2*…*Rn,
Wherein, RiIt is the random point obtained on the preset elliptic curve for i-th of signature participant, riIt is i-th of label The random number that name participant generates, R are the target random points that the random number based on each signature participant obtains;
Participant of respectively signing in signature center is based on the target random point and is utilized respectively following formula to the message to be signed The signature unit signed, and be sent in the signature center, the signature unit synthesize the label of each signature participant Name obtains the signature of the message to be signed:
si=ri+c*IDi*xi,
Wherein, IDiFor the mark of i-th of participant of signing, c=H (X, R, m), H are hash function, and m is the message to be signed, X is the set of the public key of all signature participants in signature center, siFor i-th of signature participant to the message to be signed into Capable signature, the signature for the message to be signed that the signature unit synthesizes are (R, S), S=s1+s2+…+sn
2. the method according to claim 1, wherein each signature participant in signature center is based on the label After the step of private key of name participant obtains the public key of the signature participant using following formula, the method also includes:
Each signature participant in signature center announces the public key of the signature participant so that signature verification can obtain by The public key set of the public key composition of all signature participants in signature center;
Participant of respectively signing in signature center is based on the target random point and is utilized respectively following formula to be signed disappearing to described The signature unit signed, and be sent in the signature center is ceased, the signature unit synthesizes each signature participant After the step of signature obtains the signature of the message to be signed, the method also includes:
Signature unit in signature center sends the signature carried out to the message to be signed to Target Signature authentication, with Toilet states Target Signature authentication and carries out sign test to the message to be signed using the public key set.
3. according to the method described in claim 2, it is characterized in that, the Target Signature authentication utilizes the public key set base Sign test is carried out to the message to be signed in following formula:
G^S=R* (X1^ID1+…+Xn^IDn)*c。
4. the method according to claim 1, wherein the general formula of the preset elliptic curve equation are as follows:
Y^2=x^3+a*x+b (modp),
Wherein, a and b is the coefficient of the preset elliptic curve equation, and p is modulus.
5. the method according to claim 1, wherein the key generation centre is in the following way according to each The mark of signature participant generates private key:
The key generation centre is using the hash algorithm specific to the key generation centre to the mark of each signature participant Hash operation is carried out, the private key of each signature participant is obtained.
6. the method according to claim 1, wherein the key generation centre is in the following way according to each The mark of signature participant generates private key:
The key generation centre encrypts the mark of each signature participant using the private key of itself, obtains each signature The private key of participant.
7. according to claim 1 to method described in 6 any one, which is characterized in that respectively signature participates in the signature center The type of the mark of side be it is identical, the type of the mark of the signature participant is identification card number, cell-phone number, in email address One.
8. a kind of signature center characterized by comprising signature unit and multiple signature participants, the signature unit include Target random point obtains module and synthesis module, and the signature participant includes obtaining module, receiving module, public key acquisition mould Block, generation module and signature blocks, in which:
Module is obtained, for obtaining the Prime Orders cyclic group established based on preset elliptic curve equation, the cyclic group includes Member is generated, the signature participant has mark;
Receiving module, the private key generated for receiving key generation centre according to the mark of the signature participant;
Public key acquisition module obtains the public affairs of the signature participant for the private key based on the signature participant using following formula Key:
Xi=g^xi,
Wherein, XiThe public key for i-th of signature participant for being, g are the generation member of the cyclic group, xiIt is i-th of signature ginseng With the private key of side;
Generation module, for generating a random number when receiving the signature request for message to be signed;
Target random point obtains module, for the random number based on each signature participant using following formula described preset ellipse Target random point is obtained on circular curve:
Ri=g^ri,
R=R1*R2*…*Rn,
Wherein, RiIt is the random point obtained on the preset elliptic curve for i-th of signature participant, riIt is i-th of label The random number that name participant generates, R are the target random points that the random number based on each signature participant obtains;
Signature blocks sign to the message to be signed for being utilized respectively following formula based on the target random point, And it is sent to the signature unit in the signature center:
si=ri+c*IDi*xi,
Wherein, IDiFor the mark of i-th of participant of signing, c=H (X, R, m), H are hash function, and m is the message to be signed, X is the set of the public key of all signature participants in signature center, siFor i-th of signature participant to the message to be signed into Capable signature;
Synthesis module, the signature for synthesizing each signature participant obtain the signature (R, S) of the message to be signed, wherein S =s1+s2+…+sn
9. a kind of computer-readable program medium, which is characterized in that it is stored with computer program instructions, when the computer journey When sequence instruction is computer-executed, computer is made to execute method according to any one of claim 1 to 7.
10. a kind of electronic equipment, which is characterized in that the electronic equipment includes:
Processor;
Memory is stored with computer-readable instruction on the memory, and the computer-readable instruction is held by the processor When row, method as described in any one of claim 1 to 7 is realized.
CN201910671776.9A 2019-07-24 2019-07-24 Multiple signature method, signature center, program medium, and electronic device Active CN110351096B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910671776.9A CN110351096B (en) 2019-07-24 2019-07-24 Multiple signature method, signature center, program medium, and electronic device
PCT/CN2019/123094 WO2021012574A1 (en) 2019-07-24 2019-12-04 Multisignature method, signature center, medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910671776.9A CN110351096B (en) 2019-07-24 2019-07-24 Multiple signature method, signature center, program medium, and electronic device

Publications (2)

Publication Number Publication Date
CN110351096A true CN110351096A (en) 2019-10-18
CN110351096B CN110351096B (en) 2022-02-01

Family

ID=68180024

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910671776.9A Active CN110351096B (en) 2019-07-24 2019-07-24 Multiple signature method, signature center, program medium, and electronic device

Country Status (2)

Country Link
CN (1) CN110351096B (en)
WO (1) WO2021012574A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111162912A (en) * 2019-12-30 2020-05-15 深圳前海微众银行股份有限公司 Verification method and device suitable for block chain
CN111523889A (en) * 2020-04-17 2020-08-11 昆明大棒客科技有限公司 Multi-signature implementation method, device, equipment and storage medium
CN111817858A (en) * 2020-07-27 2020-10-23 北京金仓幸福科技有限公司 Block chain data security method based on multiple signatures
WO2021012574A1 (en) * 2019-07-24 2021-01-28 深圳壹账通智能科技有限公司 Multisignature method, signature center, medium and electronic device
CN112613882A (en) * 2020-12-29 2021-04-06 成都知道创宇信息技术有限公司 Distributed signature system and management method
CN112737777A (en) * 2020-12-29 2021-04-30 北京百度网讯科技有限公司 Threshold signature and signature verification method, device, equipment and medium based on secret key
CN113112269A (en) * 2021-04-09 2021-07-13 杭州复杂美科技有限公司 Multiple signature method, computer device, and storage medium
CN113381856A (en) * 2021-07-07 2021-09-10 北京明朝万达科技股份有限公司 Digital signature and signature verification method, system, device and storage medium

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113139197A (en) * 2021-04-27 2021-07-20 上海淇玥信息技术有限公司 Project signature checking method and device and electronic equipment
CN113343259B (en) * 2021-06-17 2023-09-29 北京宏思电子技术有限责任公司 SM 2-based joint signature realization method and device, electronic equipment and storage medium
CN114070556B (en) * 2021-11-15 2023-07-25 成都卫士通信息产业股份有限公司 Threshold ring signature method and device, electronic equipment and readable storage medium
CN113869901B (en) * 2021-12-02 2022-05-10 腾讯科技(深圳)有限公司 Key generation method, key generation device, computer-readable storage medium and computer equipment
CN115001711B (en) * 2022-06-10 2024-01-30 成都卫士通信息产业股份有限公司 Information signing method, device, electronic equipment and computer readable storage medium
CN114780923B (en) * 2022-06-17 2022-09-27 杭州天谷信息科技有限公司 Electronic seal management and control method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106941406A (en) * 2017-05-02 2017-07-11 深圳奥联信息安全技术有限公司 Identify-based encryption endorsement method, decryption sign test method and its device
CN107171788A (en) * 2017-04-08 2017-09-15 西安邮电大学 A kind of identity-based and the constant online offline aggregate signature method of signature length
CN107395370A (en) * 2017-09-05 2017-11-24 深圳奥联信息安全技术有限公司 Digital signature method and device based on mark
CN108650097A (en) * 2018-04-28 2018-10-12 上海扈民区块链科技有限公司 A kind of efficient aggregation number endorsement method
WO2018229608A1 (en) * 2017-06-13 2018-12-20 nChain Holdings Limited Computer-implemented system and method providing a decentralised protocol for the recovery of cryptographic assets
CN109064170A (en) * 2018-07-23 2018-12-21 西安电子科技大学 Group signature method without trusted party
CN110011806A (en) * 2019-03-22 2019-07-12 西安邮电大学 Multiple isomorphism endorsement method under multi-source network encoding mechanism

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459506B (en) * 2007-12-14 2011-09-14 华为技术有限公司 Cipher key negotiation method, system, customer terminal and server for cipher key negotiation
CN102983971B (en) * 2012-10-10 2015-07-15 中国科学技术大学苏州研究院 Certificateless signature algorithm for user identity authentication in network environment
CN110351096B (en) * 2019-07-24 2022-02-01 深圳壹账通智能科技有限公司 Multiple signature method, signature center, program medium, and electronic device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107171788A (en) * 2017-04-08 2017-09-15 西安邮电大学 A kind of identity-based and the constant online offline aggregate signature method of signature length
CN106941406A (en) * 2017-05-02 2017-07-11 深圳奥联信息安全技术有限公司 Identify-based encryption endorsement method, decryption sign test method and its device
WO2018229608A1 (en) * 2017-06-13 2018-12-20 nChain Holdings Limited Computer-implemented system and method providing a decentralised protocol for the recovery of cryptographic assets
CN107395370A (en) * 2017-09-05 2017-11-24 深圳奥联信息安全技术有限公司 Digital signature method and device based on mark
CN108650097A (en) * 2018-04-28 2018-10-12 上海扈民区块链科技有限公司 A kind of efficient aggregation number endorsement method
CN109064170A (en) * 2018-07-23 2018-12-21 西安电子科技大学 Group signature method without trusted party
CN110011806A (en) * 2019-03-22 2019-07-12 西安邮电大学 Multiple isomorphism endorsement method under multi-source network encoding mechanism

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021012574A1 (en) * 2019-07-24 2021-01-28 深圳壹账通智能科技有限公司 Multisignature method, signature center, medium and electronic device
CN111162912A (en) * 2019-12-30 2020-05-15 深圳前海微众银行股份有限公司 Verification method and device suitable for block chain
CN111162912B (en) * 2019-12-30 2021-06-15 深圳前海微众银行股份有限公司 Verification method and device suitable for block chain and storage medium
CN111523889A (en) * 2020-04-17 2020-08-11 昆明大棒客科技有限公司 Multi-signature implementation method, device, equipment and storage medium
CN111523889B (en) * 2020-04-17 2023-09-01 昆明大棒客科技有限公司 Multiple signature implementation method, device, equipment and storage medium
CN111817858A (en) * 2020-07-27 2020-10-23 北京金仓幸福科技有限公司 Block chain data security method based on multiple signatures
CN112613882A (en) * 2020-12-29 2021-04-06 成都知道创宇信息技术有限公司 Distributed signature system and management method
CN112737777A (en) * 2020-12-29 2021-04-30 北京百度网讯科技有限公司 Threshold signature and signature verification method, device, equipment and medium based on secret key
CN113112269A (en) * 2021-04-09 2021-07-13 杭州复杂美科技有限公司 Multiple signature method, computer device, and storage medium
CN113112269B (en) * 2021-04-09 2023-11-28 杭州复杂美科技有限公司 Multiple signature method, computer device, and storage medium
CN113381856A (en) * 2021-07-07 2021-09-10 北京明朝万达科技股份有限公司 Digital signature and signature verification method, system, device and storage medium

Also Published As

Publication number Publication date
CN110351096B (en) 2022-02-01
WO2021012574A1 (en) 2021-01-28

Similar Documents

Publication Publication Date Title
CN110351096A (en) Multi-signature method, signature center, medium and electronic equipment
US11757656B2 (en) Efficient post-quantum anonymous attestation with signature-based join protocol and unlimited signatures
CN103765809B (en) The public key of implicit authentication
CN103733564B (en) Utilize the digital signature of implicit certificate chain
US10790971B1 (en) Preventing misrepresentation of input data by participants in a secure multi-party computation
EP2916484B1 (en) User Authentication using elliptic curve based OTP
CN103718500A (en) Credential validation
CN109409472B (en) Two-dimensional code generation method, data processing device and server
CN110380862A (en) Signature verification method, device, computer equipment and storage medium
CN103780383B (en) One kind is based on hyperspherical multivariable public key signature/checking system and method
CN103605784A (en) Data integrity verifying method under multi-cloud environment
CN109936455A (en) A kind of methods, devices and systems of digital signature
CN111008863A (en) Lottery drawing method and system based on block chain
CN105515778B (en) Cloud storage data integrity services signatures method
CN110311776A (en) Data processing method, device, computer equipment and storage medium
US11575515B2 (en) Post-quantum secure remote attestation for autonomous systems
CN110062002A (en) A kind of method for authenticating and Related product
CN106330448A (en) User legality verification method and system, and devices
CN110233736A (en) A kind of digital signature generation method, verification method, device, equipment, medium
CN102761556A (en) Method to protect communication security and privacy function of mobile client
CN109345267A (en) The method for anti-counterfeit and system of wine based on block chain
KR20200046481A (en) A random number generator, an encryption device including the same and a operating method thereof
US20150023498A1 (en) Byzantine fault tolerance and threshold coin tossing
CN106411520A (en) Method, device and system for processing virtual resource data
CN114760052A (en) Bank Internet of things platform key generation method and device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information

Address after: 201, room 518000, building A, No. 1, front Bay Road, Qianhai Shenzhen Guangdong Shenzhen Hong Kong cooperation zone (Qianhai business secretary)

Applicant after: Shenzhen one ledger Intelligent Technology Co., Ltd.

Address before: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A

Applicant before: Shenzhen one ledger Intelligent Technology Co., Ltd.

CB02 Change of applicant information
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant