面向 Web3 的 SM2 私钥保护方案

Translated title of the contribution: Private Key Protected SM2 Scheme for Web3

Fu Tai Zhang, Jie Zhang*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

To solve the problems of users’ private key security, this study proposes a user-oriented and practical private key protection framework by combining secret sharing and edge computing mode. Based on this framework, it designs a private key protection scheme for the SM2 public-key cryptographic system. In this scheme, a user’s SM2 private key is divided into two shares via a secret sharing scheme and kept by the user’s device and the edge server respectively. The public-key cryptographic task requested by Web3 applications is executed cooperatively by the user’s device and the edge server without having to recover the original private key. After the user’s device or the edge server is attacked, a key updating protocol will be executed among them to update the private key shares and scrap the one that may have been leaked. Experiment results show that the computing time of the new scheme is acceptable for common devices (smartphones, laptops, etc.) in the real world.

Translated title of the contributionPrivate Key Protected SM2 Scheme for Web3
Original languageChinese (Traditional)
Pages (from-to)5621-5635
Number of pages15
JournalRuan Jian Xue Bao/Journal of Software
Volume35
Issue number12
DOIs
Publication statusPublished - 2024

Keywords

  • edge computing
  • key management
  • leakage-resilient
  • private key protection
  • SM2

Fingerprint

Dive into the research topics of 'Private Key Protected SM2 Scheme for Web3'. Together they form a unique fingerprint.

Cite this