System for generating, verifying and mixing digital signatures of p-element domain SM2 elliptic curves

A digital signature and elliptic curve technology, which is applied in the field of information security and can solve problems such as applying difficult algorithms to applications

Active Publication Date: 2012-10-31
AEROSPACE INFORMATION
View PDF6 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, what the State Cryptography Administration has announced is only the flow of the SM2 elliptic curve public-key cryptographic algorithm. At present, there has not been any hardware device that implements it in hardware, and it is difficult to put this excellent algorithm into practice.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for generating, verifying and mixing digital signatures of p-element domain SM2 elliptic curves
  • System for generating, verifying and mixing digital signatures of p-element domain SM2 elliptic curves
  • System for generating, verifying and mixing digital signatures of p-element domain SM2 elliptic curves

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The principles and features of the present invention will be described below with reference to the accompanying drawings. The examples are only used to explain the present invention, but not to limit the scope of the present invention.

[0039] figure 1 The flow chart of the digital signature generation algorithm in the SM2 elliptic curve public key cryptography algorithm published by the State Cryptography Administration. In the p-ary domain, the equation of the elliptic curve is y 2 =x 3 +ax+b, where p is a prime number greater than 3, a and b are both values ​​in the p-element field, and satisfy (4a 3 +27b 2 )mod p is not 0. The elliptic curves in the present invention all refer to elliptic curves in the p-element domain.

[0040] The digital signature is some data attached to the message to be signed, or the result of the cryptographic transformation of the data unit. In normal use, the digital signature can provide the following services: (1) confirm the sourc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a system for generating, verifying and mixing digital signatures of p-element domain SM2 elliptic curves. The system functions through the following steps: m' which is obtained by combining a message (m) to be signed with a signer hash value (ZA) is sent to a password hash module; r which is obtained through r=(e+x1)mod n is sent to an s generation module; when r=0, r+k=n or s=0, a random number generation module is notified to regenerate k; r and s are used as signature control centers for output of the digital signature of m; password hash computation is performed to m' to generate the password hash module of the combined message hash value e; the random number generation module of the random number k is generated; k doubling computation is performed to the base G of an elliptic curve; the generated coordinate (x1,y1) is used as the doubling computation module of the result [k]G; and the s generation module is generated according to s=[(1+dA)<-1>*(k-r*dA)] mod n, where n is the order of the elliptic curve, and dA is the private key of the signer. According to the invention, the digital signature algorithm in the SM2 elliptic curve public-key algorithm can be achieved through hardware.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a digital signature generation, verification and mixing system of a p-element domain SM2 elliptic curve. Background technique [0002] With the development of communication technology and information processing technology, more and more attention has been paid to the security of information in the transmission process. It is necessary to use information processing technology to ensure that information is not eavesdropped, tampered and counterfeited during the communication process. Cryptography can solve this requirement very well. [0003] Since Diffie and Hellmann proposed the concept of public key cryptosystems in 1976, there have been three types of recognized safe and effective public key cryptosystems, which depend on the mathematical problems of integer factorization problem (IFP) and discrete logarithm problem (DLP). ) and elliptic curve discrete logarithm p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 徐树民屈善新刘振王绍麟田心刘建巍
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products