Movatterモバイル変換


[0]ホーム

URL:


CN104821884A - Private key protection method based on asymmetric secret key system - Google Patents

Private key protection method based on asymmetric secret key system
Download PDF

Info

Publication number
CN104821884A
CN104821884ACN201510246652.8ACN201510246652ACN104821884ACN 104821884 ACN104821884 ACN 104821884ACN 201510246652 ACN201510246652 ACN 201510246652ACN 104821884 ACN104821884 ACN 104821884A
Authority
CN
China
Prior art keywords
private key
proxy server
pki
server end
user side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510246652.8A
Other languages
Chinese (zh)
Other versions
CN104821884B (en
Inventor
吕文华
宛海加
王家辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Precious Science And Technology Ltd Of Receipt And Payment
Original Assignee
Precious Science And Technology Ltd Of Receipt And Payment
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Precious Science And Technology Ltd Of Receipt And PaymentfiledCriticalPrecious Science And Technology Ltd Of Receipt And Payment
Priority to CN201510246652.8ApriorityCriticalpatent/CN104821884B/en
Publication of CN104821884ApublicationCriticalpatent/CN104821884A/en
Application grantedgrantedCritical
Publication of CN104821884BpublicationCriticalpatent/CN104821884B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Landscapes

Abstract

The invention discloses a private key protection method based on an asymmetric secret key system. The method comprises the steps: employing distributed operation during the building of a private key and/or signature encryption. A public key is divided into different public key segments, wherein one segment is used for secondary encryption and the other segment is used for decryption and verification. During the distributed operation, a proxy server terminal CPU and a user terminal CPU complete encryption operation at different levels. During the distributed operation, only the distributed operation of the public key is carried out and the distributed operation of a private key is not carried out. The private key is not changed, thereby enabling the private key and the public key on the proxy server terminal to be in asymmetric relation. According to the invention, the concept and logic of a shadow public key is added, and the encryption of the private key or signature cryptograph can pass the verification of the public key only of the shadow public key participates the distributed operation, thereby preventing the encryption operation and a hacker Trojan invader from working in the same CPU and internal memory environment, and avoiding a problem of signature embezzlement caused by the leakage of the private key.

Description

Based on the private key protection method of unsymmetrical key system
Technical field
The present invention relates to a kind of private key protection method based on unsymmetrical key system, for the secret key encryption of the electronic signature such as Mobile banking, mobile phone A PP digital certificate, authentication field.
Background technology
Similar comparable technologies is there is no at present in pure soft solution.
Conventional method is single CPU computing, and namely private key does in client and independently submits to authentication after cryptographic calculation and use public-key and do deciphering sign test.
U shield with the immediate prior art of the technical program, analyze from safety perspective with reference to hardware U shield, hardware U shield adopts independently CPU and memory headroom to be encrypted computing, and object is that preventing hacker's wooden horse from following the tracks of internal memory process steals private key or forge a signature.
Summary of the invention
In order to steal private key in preventing hacker's wooden horse from following the tracks of internal memory process or forge a signature, the invention provides a kind of private key protection method based on unsymmetrical key system.
Technical scheme of the present invention is:
Based on the private key protection method of unsymmetrical key system, adopt distributed arithmetic when creating double secret key and/or encrypted signature.
PKI is split into different PKI fragments, when carrying out described distributed arithmetic, complete the computations of different levels respectively at proxy server end CPU and user terminal CPU.
When distributed arithmetic, only carry out distributed arithmetic to PKI, and do not carry out distributed arithmetic to private key, private key is constant, makes the private key of user side and the PKI of proxy server end end form asymmetric relation.
The method of distributed arithmetic is adopted specifically to comprise the following steps when creating double secret key:
S1, in proxy server end end stochastic generation two prime Pa1and Pa2, Pa1and Pa2be multiplied and obtain PKI Pa;
S2, at user terminal assignment E=Pa, and at user terminal stochastic generation two prime P and Q, calculate mould N=PQ;
S3, user terminal calculate R=(P-1) (Q-1);
S4, destruction P and Q;
S5, compare E and R at user terminal, as E>R, carry out, except remaining computing, until during E<R, judging whether E is less than RSA_F4 (65537) to E, if so, then repetition step s1, otherwise carry out next step;
S6, calculate E about the mould antielement d of R at user terminala;
S7, destruction R and E;
S8, user terminal generate random number R, R ∈ [1, N-1];
S9, calculate C=M^d at user terminala(mod N);
S10, on proxy server end, calculate C'=C^Pa1(mod N);
S11, on proxy server end, compare C'==C, if so, then repeat step s1, otherwise carry out next step;
S12, on proxy server end, calculate R'=C^Pb(mod N);
S13, on proxy server end, compare R'==R, if so, then repeat step s1, otherwise complete calculating.
Private key produces at user terminal, and after being encrypted calculating to private key, destroying the parameters of formula that encrypted private key calculates, make private key not leave user terminal.
The method of described encrypted signature, comprise PKI partition and sign test, PKI is divided and splits out a PKI fragment, and be pushed to credible sign test end in this, as shadow PKI through encryption, by the CPU of proxy server end CPU and credible sign test end, distributed arithmetic is carried out to PKI.
The method of distributed arithmetic is adopted specifically to comprise the following steps during encrypted signature:
K1, on proxy server end, calculate C'=C^Pa1(mod N);
K2, calculate H'=C'^P at credible sign test enda2(mod N);
K3, to fill at credible sign test end and obtain H=unPad (H');
K4, compare H==hash (M') at credible sign test end, if so, then sign test is passed through, otherwise sign test is not passed through.
Invention increases concept and the logic of shadow PKI, must participate in distributed arithmetic via shadow PKI, encrypted private key or signature ciphertext are just by PKI sign test.Avoid the invader such as cryptographic calculation and hacker's wooden horse to work in same CPU and memory environment, avoid because private key is revealed and the problem of stolen signature.
User side private key stores the method still adopting discrete storage redundancy computing; But not simply preserve private key with document form.This greatly enhances the difficulty that private key is stolen.In addition this new method of declaring, even if guarantee just in case private key has been stolen and also cannot have forged/falsely use signature.And in process of the invention process, without the need to change original non-pile key code system and become original PKI certificate framework.
Accompanying drawing explanation
Fig. 1 is PKI partition relation schematic diagram;
Fig. 2 is that PKI fractionation-double secret key generates schematic diagram;
Fig. 3 is PKI fractionation-sign test schematic diagram.
In figure:
A: the user using key cryptosystem altogether, i.e. user terminal;
B: the service provider that associating sign test is provided, i.e. agency service end;
C: credible sign test end, such as bank---" C " implication is herein different from the implication of " C ", " C' " in formula calculation process; Wherein the C of formula calculation process is ciphertext.
Embodiment
Below in conjunction with accompanying drawing, technical scheme of the present invention is specifically addressed; it is to be noted; technical scheme of the present invention is not limited to the execution mode described in embodiment; the content of those skilled in the art's reference and reference technical solution of the present invention; the improvement that basis of the present invention is carried out and design, should belong to protection scope of the present invention.
As shown in Figure 1, the private key protection method based on unsymmetrical key system of the present invention:
Theory deduction, wherein, M is that expressly N is public modulus, Pafor the PKI of user A, dafor the private key of user A, Pa1and Pa2for the PKI fragment of user A, C is by private key dathe ciphertext generated, C' refers to the superencipher literary composition of proxy server end end B to ciphertext C.
Asymmetric relation can be expressed as: M^ (da× Pa) ≡ M (mod N)
Because: Pa=Pa1× Pa2
So: M^ (da× Pa1× Pa2) ≡ M (mod N)
M^((dA×PA1)×PA2)≡M(mod N)
That is: Pa2with (da× Pa1) form about the asymmetric relation of N
Formula calculates
To plaintext M, use dado encrypted private key:
C=M^dA(mod N)
To ciphertext C, use Pa1do public key encryption:
C’=C^PA1(mod N)
That is: C '=(M^da(mod N)) ^Pa1(mod N)
=(M^(dA×PA1))(mod N)
To ciphertext C ', use Pa2do public key decryptions:
C’^PA2(mod N)
=(C^PA1(mod N))^PA2(mod N)
=C^(PA1×PA2)(mod N)
=C^PA(mod N)
=M
M ': message to be verified.
As shown in Figure 2, the method for distributed arithmetic is adopted specifically to comprise the following steps when creating double secret key:
S1, on proxy server end stochastic generation two prime Pa1and Pa2be multiplied and obtain PKI Pa;
S2, at user side assignment E=Pa, and at user terminal stochastic generation two prime P and Q, calculate mould N=PQ;
S3, user side calculate R=(P-1) (Q-1);
S4, destruction P and Q;
S5, compare E and R at user side, as E>R, carry out, except remaining computing, until during E<R, judging whether E is less than RSA_F4 (65537) to E, if so, then repetition step s1, otherwise carry out next step;
S6, calculate E about the mould antielement d of R at user terminala;
S7, destruction R and E;
S8, user side generate random number R, R ∈ [1, N-1];
S9, calculate C=M^d at user sidea(mod N);
S10, on proxy server end, calculate C'=C^Pa1(mod N);
S11, on proxy server end, compare C'==C, if so, then repeat step s1, otherwise carry out next step;
S12, on proxy server end, calculate R'=C^Pa2(mod N);
S13, on proxy server end, compare R'==R, if so, then repeat step s1, otherwise complete calculating.
As shown in Figure 3, the method for distributed arithmetic is adopted specifically to comprise the following steps during encrypted signature:
K1, on proxy server end, calculate C'=C^Pa1(mod N);
K2, calculate H'=C'^P at credible sign test enda2(mod N);
K3, to fill at credible sign test end and obtain H=unPad (H');
K4, compare H==hash (M') at credible sign test end, if so, then sign test is passed through, otherwise sign test is not passed through.

Claims (8)

CN201510246652.8A2015-05-142015-05-14Private key protection method based on unsymmetrical key systemActiveCN104821884B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201510246652.8ACN104821884B (en)2015-05-142015-05-14Private key protection method based on unsymmetrical key system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201510246652.8ACN104821884B (en)2015-05-142015-05-14Private key protection method based on unsymmetrical key system

Publications (2)

Publication NumberPublication Date
CN104821884Atrue CN104821884A (en)2015-08-05
CN104821884B CN104821884B (en)2019-01-22

Family

ID=53732060

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201510246652.8AActiveCN104821884B (en)2015-05-142015-05-14Private key protection method based on unsymmetrical key system

Country Status (1)

CountryLink
CN (1)CN104821884B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106603236A (en)*2015-10-152017-04-26收付宝科技有限公司Method and device for generating signature
CN106851635A (en)*2016-12-152017-06-13北京三未信安科技发展有限公司A kind of distributed signature method and system of identity-based
CN107302438A (en)*2017-08-072017-10-27收付宝科技有限公司A kind of private key protection method based on key updating, system and device
CN109218012A (en)*2018-09-112019-01-15重庆邮电大学A kind of distributed intelligence ammeter sale of electricity method and system with concentrator
WO2020114377A1 (en)*2018-12-032020-06-11Foris LimitedSecure distributed key management system

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060104441A1 (en)*2004-11-172006-05-18Microsoft CorporationPassword protection
CN1801696A (en)*2006-01-132006-07-12南京邮电大学Key managing project for virtual organization under gridding computer environment
CN102170356A (en)*2011-05-102011-08-31北京联合智华微电子科技有限公司Authentication system realizing method supporting exclusive control of digital signature key
US20120159178A1 (en)*2010-12-152012-06-21Microsoft CorporationProviding security services on the cloud

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060104441A1 (en)*2004-11-172006-05-18Microsoft CorporationPassword protection
CN1801696A (en)*2006-01-132006-07-12南京邮电大学Key managing project for virtual organization under gridding computer environment
US20120159178A1 (en)*2010-12-152012-06-21Microsoft CorporationProviding security services on the cloud
CN102170356A (en)*2011-05-102011-08-31北京联合智华微电子科技有限公司Authentication system realizing method supporting exclusive control of digital signature key

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨帆等: "一个P2P分布式数字签名系统", 《计算机应用》*

Cited By (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106603236A (en)*2015-10-152017-04-26收付宝科技有限公司Method and device for generating signature
CN106851635A (en)*2016-12-152017-06-13北京三未信安科技发展有限公司A kind of distributed signature method and system of identity-based
CN106851635B (en)*2016-12-152019-10-29北京三未信安科技发展有限公司A kind of distributed signature method and system of identity-based
CN107302438A (en)*2017-08-072017-10-27收付宝科技有限公司A kind of private key protection method based on key updating, system and device
CN107302438B (en)*2017-08-072020-10-30吕文华Private key protection method, system and device based on key updating
CN109218012A (en)*2018-09-112019-01-15重庆邮电大学A kind of distributed intelligence ammeter sale of electricity method and system with concentrator
WO2020114377A1 (en)*2018-12-032020-06-11Foris LimitedSecure distributed key management system

Also Published As

Publication numberPublication date
CN104821884B (en)2019-01-22

Similar Documents

PublicationPublication DateTitle
CN111989891B (en)Data processing method, related device and block chain system
CN108683493B (en)Data aggregation method for providing privacy protection in smart power grid
CN107483191B (en) A SM2 algorithm key segmentation signature system and method
EP3487118A1 (en)Data processing method and device
CN109034796B (en)Alliance chain-based transaction supervision method, electronic device and readable storage medium
CN107342859B (en)Anonymous authentication method and application thereof
JP7105308B2 (en) Digital signature method, device and system
CN104052606B (en)Digital signature, signature authentication device and digital signature method
WO2021120871A1 (en)Authentication key negotiation method and apparatus, storage medium and device
US20150019868A1 (en)Public encryption method based on user id
CN104821944A (en)Hybrid encryption network data security method and system
CN104270249A (en) A Signcryption Method from Certificate-less Environment to Identity-Based Environment
CN103581175A (en)Safe data aggregation method
CN104301108A (en) A Signcryption Method from Identity-Based Environment to Certificateless Environment
CN104821884A (en)Private key protection method based on asymmetric secret key system
CN112202544A (en)Smart power grid data security aggregation method based on Paillier homomorphic encryption algorithm
WO2023010688A1 (en)Key management method and apparatus
WO2023184858A1 (en)Timestamp generation method and apparatus, and electronic device and storage medium
CN113765662A (en)Signature and decryption method and system based on SM2 algorithm
CN113067816A (en)Data encryption method and device
CN103414557B (en) Novel Key Isolation Signature Method and System
CN101714919B (en)Forward Secure Digital Signature Algorithm Based on RSA Algorithm
CN117611162A (en)Transaction authentication method and device based on elliptic curve cryptography algorithm
CN116938434A (en) Data security detection methods and devices in privacy computing
CN106534077A (en)Authenticable agent re-encryption system and method based on symmetric cryptography

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
EXSBDecision made by sipo to initiate substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant
PP01Preservation of patent right
PP01Preservation of patent right

Effective date of registration:20230516

Granted publication date:20190122


[8]ページ先頭

©2009-2025 Movatter.jp