SG11202002419WA - Method for restoring public key based on sm2 signature - Google Patents
Method for restoring public key based on sm2 signatureInfo
- Publication number
- SG11202002419WA SG11202002419WA SG11202002419WA SG11202002419WA SG11202002419WA SG 11202002419W A SG11202002419W A SG 11202002419WA SG 11202002419W A SG11202002419W A SG 11202002419WA SG 11202002419W A SG11202002419W A SG 11202002419WA SG 11202002419W A SG11202002419W A SG 11202002419WA
- Authority
- SG
- Singapore
- Prior art keywords
- signature
- public key
- key based
- restoring
- restoring public
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3033—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/26—Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/64—Self-signed certificates
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/089602 WO2019170168A2 (en) | 2019-05-31 | 2019-05-31 | Method for restoring public key based on sm2 signature |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202002419WA true SG11202002419WA (en) | 2020-04-29 |
Family
ID=67847519
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202002419WA SG11202002419WA (en) | 2019-05-31 | 2019-05-31 | Method for restoring public key based on sm2 signature |
Country Status (5)
Country | Link |
---|---|
US (3) | US10778428B1 (en) |
EP (1) | EP3673616A4 (en) |
CN (1) | CN111066285B (en) |
SG (1) | SG11202002419WA (en) |
WO (1) | WO2019170168A2 (en) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11463268B2 (en) * | 2019-09-17 | 2022-10-04 | International Business Machines Corporation | Sensor calibration |
US11277260B2 (en) * | 2019-09-17 | 2022-03-15 | International Business Machines Corporation | Off-chain notification of updates from a private blockchain |
US11509469B2 (en) * | 2020-02-28 | 2022-11-22 | Reynold Vogel, Inc. | Methods and systems for password recovery based on user location |
CN112152814A (en) * | 2020-09-21 | 2020-12-29 | 中国电子科技网络信息安全有限公司 | Method for recovering public key and address based on sm2 signature in block chain |
CN112202779B (en) * | 2020-09-29 | 2022-08-30 | 深圳壹账通智能科技有限公司 | Block chain based information encryption method, device, equipment and medium |
CN112100644B (en) * | 2020-11-19 | 2021-03-16 | 飞天诚信科技股份有限公司 | Method and device for generating data signature |
CN113098692B (en) * | 2021-04-06 | 2023-07-28 | 湖北央中巨石信息技术有限公司 | Synchronous consensus algorithm, system and medium for multiple parties under same prefabrication rule |
CN113055189B (en) * | 2021-06-02 | 2021-08-10 | 工业信息安全(四川)创新中心有限公司 | SM2 digital signature verification failure reason judgment method, device, equipment and medium |
CN113158176B (en) * | 2021-06-02 | 2022-08-02 | 工业信息安全(四川)创新中心有限公司 | Public key analysis method, device, equipment and storage medium based on SM2 signature |
CN114614991B (en) * | 2022-03-11 | 2023-12-26 | 国网浙江省电力有限公司电力科学研究院 | Block chain automatic settlement method and system suitable for small micro-load aggregate response |
CN114614992B (en) * | 2022-03-11 | 2023-10-13 | 深圳市名竹科技有限公司 | Signature value output and verification method, device, computer equipment and storage medium |
CN114499860A (en) * | 2022-03-22 | 2022-05-13 | 深圳壹账通智能科技有限公司 | Signature public key compression method and device, computer equipment and storage medium |
CN114650135B (en) * | 2022-04-01 | 2024-01-02 | 浙江大学 | Software and hardware cooperated SM2 elliptic curve cryptography algorithm implementation method |
CN115086024A (en) * | 2022-06-14 | 2022-09-20 | 深圳云创数安科技有限公司 | Data transmission method, device, equipment and medium based on data signature |
CN115208586B (en) * | 2022-09-13 | 2022-12-30 | 中安网脉(北京)技术股份有限公司 | Secret sharing-based digital signature method and system |
CN116980129B (en) * | 2023-09-22 | 2024-03-26 | 深圳市纽创信安科技开发有限公司 | Digital signature generation method, device, electronic equipment and readable storage medium |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5068176B2 (en) * | 2005-01-18 | 2012-11-07 | サーティコム コーポレーション | Enhanced verification of digital signatures and public keys |
GB0803320D0 (en) * | 2008-02-22 | 2008-04-02 | Cambridge Silicon Radio Ltd | Protecting against security attack |
US8745376B2 (en) * | 2011-10-14 | 2014-06-03 | Certicom Corp. | Verifying implicit certificates and digital signatures |
CN103427997B (en) * | 2013-08-16 | 2016-06-22 | 西安西电捷通无线网络通信股份有限公司 | A kind of method generating digital signature and device |
US9800418B2 (en) * | 2015-05-26 | 2017-10-24 | Infosec Global Inc. | Signature protocol |
US10700861B2 (en) * | 2016-07-29 | 2020-06-30 | Workday, Inc. | System and method for generating a recovery key and managing credentials using a smart blockchain contract |
CN106878022B (en) * | 2017-02-15 | 2019-12-24 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Method and device for signing and verifying on block chain |
CN109617699A (en) * | 2019-01-16 | 2019-04-12 | 北京沃东天骏信息技术有限公司 | A kind of key generation method, block chain network service platform and storage medium |
EP3607483B1 (en) * | 2019-03-15 | 2021-07-07 | Advanced New Technologies Co., Ltd. | Authentication based on a recoverd public key |
-
2019
- 2019-05-31 EP EP19763290.4A patent/EP3673616A4/en not_active Withdrawn
- 2019-05-31 CN CN201980004166.1A patent/CN111066285B/en active Active
- 2019-05-31 SG SG11202002419WA patent/SG11202002419WA/en unknown
- 2019-05-31 WO PCT/CN2019/089602 patent/WO2019170168A2/en unknown
- 2019-12-13 US US16/714,201 patent/US10778428B1/en active Active
-
2020
- 2020-07-31 US US16/945,004 patent/US10911231B2/en active Active
-
2021
- 2021-02-01 US US17/164,677 patent/US11196556B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP3673616A2 (en) | 2020-07-01 |
WO2019170168A3 (en) | 2020-03-12 |
CN111066285A (en) | 2020-04-24 |
US20210160066A1 (en) | 2021-05-27 |
CN111066285B (en) | 2023-06-30 |
WO2019170168A2 (en) | 2019-09-12 |
US10778428B1 (en) | 2020-09-15 |
US11196556B2 (en) | 2021-12-07 |
EP3673616A4 (en) | 2020-10-28 |
US20200382296A1 (en) | 2020-12-03 |
US10911231B2 (en) | 2021-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202002419WA (en) | Method for restoring public key based on sm2 signature | |
EP3080959A4 (en) | System and method for securing source routing using public key based digital signature | |
EP3567888A4 (en) | Method for updating certificate issuer public key, and related device and system | |
EP3374913A4 (en) | Public/private key biometric authentication system | |
EP3611949A4 (en) | Key configuration method, apparatus and system | |
EP3538850A4 (en) | Acoustic method and system for providing digital data | |
EP3432532A4 (en) | Key distribution and authentication method, apparatus and system | |
EP3771242A4 (en) | Key generation method and relevant apparatus | |
EP3543884A4 (en) | Method and system for protecting system partition key data, and terminal | |
EP3698514A4 (en) | System and method for generating and depositing keys for multi-point authentication | |
EP3503465A4 (en) | Method for distributing key, related devices and system | |
EP3809625A4 (en) | Chip, method for generating private key, and method for trusted verification | |
EP3678306A4 (en) | Apparatus and method for generating a key | |
EP3373186A4 (en) | Apparatus and method for generating identification key | |
EP3035587A4 (en) | Hypersphere-based multivariable public key signature/verification system and method | |
IL279980A (en) | A system and a method for signing transactions using airgapped private keys | |
EP3857812A4 (en) | Key management for multi-party computation | |
EP3704829B8 (en) | Cryptographic key generation system and method | |
EP3096488A4 (en) | Hypersphere-based multivariable public key encryption/decryption system and method | |
EP3570487A4 (en) | Private key generation method, device and system | |
EP3688925A4 (en) | Method and system for key agreement utilizing semigroups | |
EP3796194A4 (en) | Secure element for processing and authenticating digital key and operation method therefor | |
SG11202112915VA (en) | System for restoring lost private key | |
GB2572068B (en) | Signature system and method for multivariable public key | |
EP3407535A4 (en) | Apparatus for generating identification key and management method thereof |