SG11202002419WA - Method for restoring public key based on sm2 signature - Google Patents

Method for restoring public key based on sm2 signature

Info

Publication number
SG11202002419WA
SG11202002419WA SG11202002419WA SG11202002419WA SG11202002419WA SG 11202002419W A SG11202002419W A SG 11202002419WA SG 11202002419W A SG11202002419W A SG 11202002419WA SG 11202002419W A SG11202002419W A SG 11202002419WA SG 11202002419W A SG11202002419W A SG 11202002419WA
Authority
SG
Singapore
Prior art keywords
signature
public key
key based
restoring
restoring public
Prior art date
Application number
SG11202002419WA
Inventor
Yao Wang
Hao Lei
Li Lin
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Publication of SG11202002419WA publication Critical patent/SG11202002419WA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3033Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/26Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/64Self-signed certificates
SG11202002419WA 2019-05-31 2019-05-31 Method for restoring public key based on sm2 signature SG11202002419WA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/089602 WO2019170168A2 (en) 2019-05-31 2019-05-31 Method for restoring public key based on sm2 signature

Publications (1)

Publication Number Publication Date
SG11202002419WA true SG11202002419WA (en) 2020-04-29

Family

ID=67847519

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202002419WA SG11202002419WA (en) 2019-05-31 2019-05-31 Method for restoring public key based on sm2 signature

Country Status (5)

Country Link
US (3) US10778428B1 (en)
EP (1) EP3673616A4 (en)
CN (1) CN111066285B (en)
SG (1) SG11202002419WA (en)
WO (1) WO2019170168A2 (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11463268B2 (en) * 2019-09-17 2022-10-04 International Business Machines Corporation Sensor calibration
US11277260B2 (en) * 2019-09-17 2022-03-15 International Business Machines Corporation Off-chain notification of updates from a private blockchain
US11509469B2 (en) * 2020-02-28 2022-11-22 Reynold Vogel, Inc. Methods and systems for password recovery based on user location
CN112152814A (en) * 2020-09-21 2020-12-29 中国电子科技网络信息安全有限公司 Method for recovering public key and address based on sm2 signature in block chain
CN112202779B (en) * 2020-09-29 2022-08-30 深圳壹账通智能科技有限公司 Block chain based information encryption method, device, equipment and medium
CN112100644B (en) * 2020-11-19 2021-03-16 飞天诚信科技股份有限公司 Method and device for generating data signature
CN113098692B (en) * 2021-04-06 2023-07-28 湖北央中巨石信息技术有限公司 Synchronous consensus algorithm, system and medium for multiple parties under same prefabrication rule
CN113055189B (en) * 2021-06-02 2021-08-10 工业信息安全(四川)创新中心有限公司 SM2 digital signature verification failure reason judgment method, device, equipment and medium
CN113158176B (en) * 2021-06-02 2022-08-02 工业信息安全(四川)创新中心有限公司 Public key analysis method, device, equipment and storage medium based on SM2 signature
CN114614991B (en) * 2022-03-11 2023-12-26 国网浙江省电力有限公司电力科学研究院 Block chain automatic settlement method and system suitable for small micro-load aggregate response
CN114614992B (en) * 2022-03-11 2023-10-13 深圳市名竹科技有限公司 Signature value output and verification method, device, computer equipment and storage medium
CN114499860A (en) * 2022-03-22 2022-05-13 深圳壹账通智能科技有限公司 Signature public key compression method and device, computer equipment and storage medium
CN114650135B (en) * 2022-04-01 2024-01-02 浙江大学 Software and hardware cooperated SM2 elliptic curve cryptography algorithm implementation method
CN115086024A (en) * 2022-06-14 2022-09-20 深圳云创数安科技有限公司 Data transmission method, device, equipment and medium based on data signature
CN115208586B (en) * 2022-09-13 2022-12-30 中安网脉(北京)技术股份有限公司 Secret sharing-based digital signature method and system
CN116980129B (en) * 2023-09-22 2024-03-26 深圳市纽创信安科技开发有限公司 Digital signature generation method, device, electronic equipment and readable storage medium

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5068176B2 (en) * 2005-01-18 2012-11-07 サーティコム コーポレーション Enhanced verification of digital signatures and public keys
GB0803320D0 (en) * 2008-02-22 2008-04-02 Cambridge Silicon Radio Ltd Protecting against security attack
US8745376B2 (en) * 2011-10-14 2014-06-03 Certicom Corp. Verifying implicit certificates and digital signatures
CN103427997B (en) * 2013-08-16 2016-06-22 西安西电捷通无线网络通信股份有限公司 A kind of method generating digital signature and device
US9800418B2 (en) * 2015-05-26 2017-10-24 Infosec Global Inc. Signature protocol
US10700861B2 (en) * 2016-07-29 2020-06-30 Workday, Inc. System and method for generating a recovery key and managing credentials using a smart blockchain contract
CN106878022B (en) * 2017-02-15 2019-12-24 中钞信用卡产业发展有限公司杭州区块链技术研究院 Method and device for signing and verifying on block chain
CN109617699A (en) * 2019-01-16 2019-04-12 北京沃东天骏信息技术有限公司 A kind of key generation method, block chain network service platform and storage medium
EP3607483B1 (en) * 2019-03-15 2021-07-07 Advanced New Technologies Co., Ltd. Authentication based on a recoverd public key

Also Published As

Publication number Publication date
EP3673616A2 (en) 2020-07-01
WO2019170168A3 (en) 2020-03-12
CN111066285A (en) 2020-04-24
US20210160066A1 (en) 2021-05-27
CN111066285B (en) 2023-06-30
WO2019170168A2 (en) 2019-09-12
US10778428B1 (en) 2020-09-15
US11196556B2 (en) 2021-12-07
EP3673616A4 (en) 2020-10-28
US20200382296A1 (en) 2020-12-03
US10911231B2 (en) 2021-02-02

Similar Documents

Publication Publication Date Title
SG11202002419WA (en) Method for restoring public key based on sm2 signature
EP3080959A4 (en) System and method for securing source routing using public key based digital signature
EP3567888A4 (en) Method for updating certificate issuer public key, and related device and system
EP3374913A4 (en) Public/private key biometric authentication system
EP3611949A4 (en) Key configuration method, apparatus and system
EP3538850A4 (en) Acoustic method and system for providing digital data
EP3432532A4 (en) Key distribution and authentication method, apparatus and system
EP3771242A4 (en) Key generation method and relevant apparatus
EP3543884A4 (en) Method and system for protecting system partition key data, and terminal
EP3698514A4 (en) System and method for generating and depositing keys for multi-point authentication
EP3503465A4 (en) Method for distributing key, related devices and system
EP3809625A4 (en) Chip, method for generating private key, and method for trusted verification
EP3678306A4 (en) Apparatus and method for generating a key
EP3373186A4 (en) Apparatus and method for generating identification key
EP3035587A4 (en) Hypersphere-based multivariable public key signature/verification system and method
IL279980A (en) A system and a method for signing transactions using airgapped private keys
EP3857812A4 (en) Key management for multi-party computation
EP3704829B8 (en) Cryptographic key generation system and method
EP3096488A4 (en) Hypersphere-based multivariable public key encryption/decryption system and method
EP3570487A4 (en) Private key generation method, device and system
EP3688925A4 (en) Method and system for key agreement utilizing semigroups
EP3796194A4 (en) Secure element for processing and authenticating digital key and operation method therefor
SG11202112915VA (en) System for restoring lost private key
GB2572068B (en) Signature system and method for multivariable public key
EP3407535A4 (en) Apparatus for generating identification key and management method thereof