CN113765670B - 无证书的可信任密钥生成方法与系统 - Google Patents

无证书的可信任密钥生成方法与系统 Download PDF

Info

Publication number
CN113765670B
CN113765670B CN202010495449.5A CN202010495449A CN113765670B CN 113765670 B CN113765670 B CN 113765670B CN 202010495449 A CN202010495449 A CN 202010495449A CN 113765670 B CN113765670 B CN 113765670B
Authority
CN
China
Prior art keywords
parties
party
key
public key
trusted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010495449.5A
Other languages
English (en)
Other versions
CN113765670A (zh
Inventor
尚望
兰天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Tianrui Xin'an Technology Co ltd
Original Assignee
Chengdu Tianrui Xin'an Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Tianrui Xin'an Technology Co ltd filed Critical Chengdu Tianrui Xin'an Technology Co ltd
Priority to CN202010495449.5A priority Critical patent/CN113765670B/zh
Publication of CN113765670A publication Critical patent/CN113765670A/zh
Application granted granted Critical
Publication of CN113765670B publication Critical patent/CN113765670B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提出了一种通信中,无证书的可信任SM2密钥生成方法和系统。具体地,通信参与双方A和B共享一个秘密k,k是一个随机数;双方分别利用k通过计算得到各自的私钥,双方和其他第三方均无法获取到对方私钥的任何信息;双方分别利用k通过计算得到对方的公钥,其他第三方均无法获取到对方公钥的任何信息;通过使用对方的公钥验证对方的签名,双方均可确认对方私钥是由k计算生成的,从而在不依赖证书的情况下,确认对方是可信任的。

Description

无证书的可信任密钥生成方法与系统
技术领域
本发明涉及通信双方在无证书情况下,生成可信任SM2密钥的方法与应用系统,包括但不仅限于该领域。
背景技术
SM2算法是一种椭圆曲线(ECC)非对称密码算法算法,是我国自主研制的密码算法,并已经发布为国家标准GB/T 32918。SM2算法可以实现加解密、签名验签等功能。
根据算法规定,设通信双方为A和B, A需要配置有私钥dA和公钥PA,B需要配置有私钥dB和公钥PB。A和B使用SM2密钥计算前,为了确认对方的是可信任的,需要通过验证对方的公钥证书来判定:
步骤1:如果通信对方的公钥证书是由认可的可信第三方机构签发,那么通过验证该公钥证书的合法性,可推导出通信对方的公钥是可信任的;
步骤2:由于公私钥对是唯一对应的,私钥生成的签名只能唯一由对应的公钥验证,那么通过验证对方签名,可推导出通信对方的私钥是可信任的。由于私钥有且只有通信对方唯一所有,所以可知通信对方是可信任的。
由于使用证书的方案,需要在系统中配置有可信第三方作为证书签发机构,通信双方需要预置可信第三方的公钥证书,需要的系统资源和管理成本较高。
发明内容
本发明提出了一种通信双方无证书的可信任SM2密钥生成方法和系统。具体地,通信参与双方A和B共享一个秘密k,k是一个随机数;双方分别利用k通过计算得到各自的私钥,双方和其他第三方均无法获取到对方私钥的任何信息;双方分别利用k通过计算得到对方的公钥,其他第三方均无法获取到对方公钥的任何信息;通过使用对方的公钥验证对方的签名,双方均可确认对方私钥是由k计算生成的。由于通信双方的私钥和公钥均有秘密k参与,只有拥有秘密k的A、B双方能够计算生成;公私钥对具有唯一对应性,任何一方私钥计算的签名,能且只能被配对的公钥验证。从而在无证书的情况下,确认对方密钥是可信任的。
下面结合附图2对本发明进行详细说明。
本发明所述,参与双方分别记为A和B,如图中MA1和MB1所示,双方共有一个秘密k,k是一个随机数。
本发明所述,双方分别利用k通过计算得到各自的私钥,说明如下。如图2中MA2所示,参与方A生成随机数a,利用k计算私钥dA=a+k;计算Pa=a*G(G为椭圆曲线上的参考点,下同),发送Pa给B。如图2中MB2所示,参与方B生成随机数b,利用k计算得到私钥dB= b+k;计算Pb= b*G,发送Pb给A。由于双方的私钥均通过自己的随机数在自身内计算生成,未向外传输,所以有且只有自己知道,对方和其他第三方均不知道该私钥的任何信息。
本发明所述,双方分别利用k通过计算得到对方的公钥,说明如下。如图中MA3所示,参与方 A使用秘密k计算Pk=k*G,然后计算得到B的公钥PB=Pk+Pb(+为椭圆曲线上的点加,下同)。如图中MB3所示,参与方B使用秘密k计算Pk=k*G,然后计算得到A的公钥PA=Pk+Pa。由背景技术描述可知,SM2是一种规定了参数的椭圆曲线密码算法,该椭圆曲线上的点的集合属于加法域。由加法域的运算规则可知,公钥PB由公钥Pk和公钥Pb点加得到;由于Pk对应的私钥为k,Pb对应的私钥为b,所以PB 对应的私钥为k+b。由于双方均通过秘密k通过计算得到对方的公钥,计算结果未向外传输,所以公钥有且只有自己知道,其他第三方均不知道该公钥的任何信息。
本发明所述,通过使用对方的公钥验证对方的签名,确认对方是可信任的,说明如下。如图中MA4所示,参与方B发送挑战r2给A,A使用私钥dA计算签名s2,将s2返回给B,B使用PA验证该签名,验证通过则证明该签名有且只能由A生成。如如图中MB4所示,参与方A发送挑战r1给B,B使用私钥dB计算签名s1,将s1返回给A,A使用PA验证该签名,验证通过则证明该签名有且只能由B生成。由背景技术可知,SM2算法的公私钥对具有唯一对应性,任何一方私钥计算的签名,能且只能被该私钥对应的公钥验证。由于通信参与双方的私钥和公钥均有秘密k参与,只有拥有秘密k的A、B双方能够计算生成,其他第三方都无法计算得到。从而在无证书的情况下,通过公钥验证对方私钥的签名,可确认对方的私钥是可信任的。
本发明不需要在系统中配置有可信第三方作为证书签发机构,通信双方也不需要预置可信第三方的公钥证书,也不需要存储通信对方的公钥证书,只需要事先预置一个双方共有的秘密,从而减少了系统资源和管理成本。通信双方的私钥仍然由内部生成,保持了私钥的唯一所特性,不破坏签名的不可抵赖性。
附图说明
图1为无证书可信任密钥的生成方法框图。
图2 为无证书可信任密钥生成的详细步骤图。
图3为服务端——客户端端两方联合解密应用示意图。
具体实施方式
下面结合附图对无证书可信任密钥生成方法及系统进行说明。本方案中服务端是可信的,只需要客户端生成可信任密钥,服务端验证客户端是可信任的。
图3是本发明在云——端两方应用示意图。图中包括云服务端,具有私钥a和公钥Pa;包括客户端,预置有一个秘密k,k是一个随机数;服务端已知客户端配置有秘密k。
客户端生成私钥:客户端生成随机数a,计算出私钥dA=a+k;计算出Pa=a*G,发送Pa给云服务端。
云服务端生成客户端公钥:云服务端收到Pa后,计算Pk=k*G,然后计算客户端的公钥PA=Pk+Pa。
云服务端验证客户端:云服务端生成调整r1,发送给客户端;客户端用自己的私钥dA计算出r1的签名s1,将s1发送给云服务端;云服务端用PA验证;验证通过,证明该签名由且只能由持有秘密k的客户端生成,从而证明客户端的私钥dA 是可信任的,客户端是可信任的。

Claims (1)

1.一种通信双方无证书的可信任SM2密钥生成方法,通信双方记为A和B,其特征在于:双方共享一个秘密k,k是一个随机数;双方分别利用k通过计算得到各自的私钥,双方及第三方均无法获取到对方私钥的任何信息;双方分别利用k通过计算得到对方的公钥,其他第三方无法获取到双方公钥的任何信息;通过使用对方的公钥验证对方的签名,双方均可确认对方私钥是由k计算生成的,从而在不依赖证书的情况下,确认对方是可信任的;所述双方分别利用k通过计算得到各自的私钥,其特征在于:参与方A生成随机数a,计算得到私钥dA=a+k,计算Pa=a*G,其中G为椭圆曲线上的参考点,发送Pa给B;参与方B生成随机数b,计算得到私钥dB=b+k,计算Pb=b*G,发送Pb给A;所述双方分别利用k通过计算得到对方的公钥,其特征在于:A计算Pk=k*G,计算得到B的公钥PB=Pk+Pb;B计算Pk=k*G,计算得到A的公钥PA=Pk+Pa;所述通过使用对方的公钥验证对方的签名,确认对方是可信任的,其特征在于:通信双方的私钥和公钥均有秘密k参与,只有拥有秘密k的A、B双方能够计算生成;公私钥对具有唯一性,A的签名,能且只能被B验证;B的签名,能且只能被A验证;
从而在无证书的情况下,确认对方密钥是可信任的。
CN202010495449.5A 2020-06-03 2020-06-03 无证书的可信任密钥生成方法与系统 Active CN113765670B (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010495449.5A CN113765670B (zh) 2020-06-03 2020-06-03 无证书的可信任密钥生成方法与系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010495449.5A CN113765670B (zh) 2020-06-03 2020-06-03 无证书的可信任密钥生成方法与系统

Publications (2)

Publication Number Publication Date
CN113765670A CN113765670A (zh) 2021-12-07
CN113765670B true CN113765670B (zh) 2024-01-26

Family

ID=78783281

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010495449.5A Active CN113765670B (zh) 2020-06-03 2020-06-03 无证书的可信任密钥生成方法与系统

Country Status (1)

Country Link
CN (1) CN113765670B (zh)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9800411B1 (en) * 2016-05-05 2017-10-24 ISARA Corporation Using a secret generator in an elliptic curve cryptography (ECC) digital signature scheme
CN109088726A (zh) * 2018-07-19 2018-12-25 郑州信大捷安信息技术股份有限公司 基于sm2算法的通信双方协同签名及解密方法和系统
CN109246129A (zh) * 2018-10-12 2019-01-18 天津赢达信科技有限公司 一种可验证客户端身份的sm2协同签名方法及系统
CN109818744A (zh) * 2019-02-27 2019-05-28 矩阵元技术(深圳)有限公司 共享秘密密钥生成方法、装置、计算机设备和存储介质
CN110011803A (zh) * 2019-02-27 2019-07-12 武汉大学 一种轻量级sm2两方协同生成数字签名的方法
CN110278088A (zh) * 2019-07-18 2019-09-24 广州安研信息科技有限公司 一种sm2协同签名方法
CN110535635A (zh) * 2019-07-19 2019-12-03 北京向芯力科技有限公司 一种支持信息隐藏的协同签名方法与系统
US10673625B1 (en) * 2019-06-15 2020-06-02 University Of South Florida Efficient identity-based and certificateless cryptosystems

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9800411B1 (en) * 2016-05-05 2017-10-24 ISARA Corporation Using a secret generator in an elliptic curve cryptography (ECC) digital signature scheme
CN109088726A (zh) * 2018-07-19 2018-12-25 郑州信大捷安信息技术股份有限公司 基于sm2算法的通信双方协同签名及解密方法和系统
CN109246129A (zh) * 2018-10-12 2019-01-18 天津赢达信科技有限公司 一种可验证客户端身份的sm2协同签名方法及系统
CN109818744A (zh) * 2019-02-27 2019-05-28 矩阵元技术(深圳)有限公司 共享秘密密钥生成方法、装置、计算机设备和存储介质
CN110011803A (zh) * 2019-02-27 2019-07-12 武汉大学 一种轻量级sm2两方协同生成数字签名的方法
US10673625B1 (en) * 2019-06-15 2020-06-02 University Of South Florida Efficient identity-based and certificateless cryptosystems
CN110278088A (zh) * 2019-07-18 2019-09-24 广州安研信息科技有限公司 一种sm2协同签名方法
CN110535635A (zh) * 2019-07-19 2019-12-03 北京向芯力科技有限公司 一种支持信息隐藏的协同签名方法与系统

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A novel approach for secure and fast generation of RSA public and private keys on SmartCard;Milad Bahadori等;《Proceedings of the 8th IEEE International NEWCAS Conference 2010》;全文 *
一种改进的无证书两方认证密钥协商协议;周彦伟等;《计算机学报》;全文 *

Also Published As

Publication number Publication date
CN113765670A (zh) 2021-12-07

Similar Documents

Publication Publication Date Title
CN107948189B (zh) 非对称密码身份鉴别方法、装置、计算机设备及存储介质
CN106506470B (zh) 网络数据安全传输方法
CN111682938B (zh) 面向中心化移动定位系统的三方可认证密钥协商方法
CN107947913B (zh) 一种基于身份的匿名认证方法与系统
CN102318258B (zh) 基于身份的认证密钥协商协议
Kilinc et al. A survey of SIP authentication and key agreement schemes
Wang et al. Security analysis of a single sign-on mechanism for distributed computer networks
CN107659395B (zh) 一种多服务器环境下基于身份的分布式认证方法及系统
CN110138567B (zh) 一种基于ecdsa的协同签名方法
US20210152370A1 (en) Digital signature method, device, and system
WO2009056048A1 (en) Method and structure for self-sealed joint proof-of-knowledge and diffie-hellman key-exchange protocols
TWI608722B (zh) Public key certificate method
CN101442411A (zh) 一种p2p网络中对等用户结点间的身份认证方法
CA2807055A1 (en) Intercepting key sessions
KR20100050846A (ko) 키 교환 시스템 및 방법
CN101145913B (zh) 一种实现网络安全通信的方法及系统
CN113572603A (zh) 一种异构的用户认证和密钥协商方法
CN111355582A (zh) 基于sm2算法的两方联合签名和解密的方法及系统
KR101704540B1 (ko) M2m 환경의 다중 디바이스 데이터 공유를 위한 그룹키 관리 방법
Yin et al. An efficient and secured data storage scheme in cloud computing using ECC-based PKI
CN108259486B (zh) 基于证书的端到端密钥交换方法
Qin et al. On the security of two identity-based signature schemes based on pairings
CN113676448B (zh) 一种基于对称秘钥的离线设备双向认证方法和系统
Chen et al. Provable secure group key establishment scheme for fog computing
CN113765670B (zh) 无证书的可信任密钥生成方法与系统

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant