Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Signing and decrypting method and system applied to cloud computing and based on SM2 algorithm

A cloud computing and algorithm technology, applied in the field of cryptography, can solve problems such as the inability to meet the low-latency application requirements of the cloud computing environment, the inapplicability of the cloud computing environment, and the large number of communications, and achieve a solution with less application requirements, low latency, and improved security. Effect

Active Publication Date: 2014-12-24
INST OF INFORMATION ENG CAS
View PDF5 Cites 65 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the implementation of the above algorithms often has complex interactions and a large number of communications, which cannot meet the application requirements of low latency and less interaction in cloud computing environments. That is to say, the above methods are not applicable to cloud computing environments.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signing and decrypting method and system applied to cloud computing and based on SM2 algorithm
  • Signing and decrypting method and system applied to cloud computing and based on SM2 algorithm
  • Signing and decrypting method and system applied to cloud computing and based on SM2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Aiming at the problems existing in the prior art, the present invention proposes a SM2 algorithm-based signature scheme and decryption scheme suitable for cloud computing environments. The SM2 algorithm is a standard commercial cryptographic algorithm, which is widely supported and used in cryptographic products.

[0031] In order to make the technical solution of the present invention more clear and understandable, the solution of the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0032] figure 1 It is a flow chart of an embodiment of the SM2 algorithm-based signature method applicable to cloud computing in the present invention, such as figure 1 As shown, the following steps 11-14 are included.

[0033] Step 11: The first communication party generates its own sub-private key D1, and the second communication party generates its own sub-private key D2.

[0034] For the convenience of expression,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a signing and decrypting method and system applied to cloud computing and based on an SM2 algorithm. Specifically, two communicating parties store some private keys respectively, operation of signing, decrypting and the like can be carried out on information only when the two parties unite, the two communicating parties can not obtain any information about the private key of the opposite side, and therefore under the circumstance that an attacker invades any party, signatures can not be forged, or ciphertexts can not be decrypted, so that the safety of the private keys in the cloud computing environment is improved; moreover, in the signing and decrypting processes, the application requirements for low delay and less interaction in the cloud computing environment can be met with less interaction needing to be carried out between the two communicating parties.

Description

technical field [0001] The invention relates to the field of encryption, in particular to a SM2 algorithm-based signature and decryption method and system suitable for cloud computing. Background technique [0002] At present, digital signature and encryption and decryption technologies based on public key cryptography have been widely used in e-commerce, identity authentication and other applications, and have become an important tool to ensure information security, and the security and use of private keys are the basis for ensuring the security of these applications . [0003] In the cloud computing environment, the main resources are gathered on the server side, and the client side usually exists in the form of weak terminals, such as smart phones, etc. Such weak terminals usually store and use private keys in the form of software, so the security protection capability is poor . For example, if the private key is completely stored in a single file on the smartphone, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L29/08
Inventor 林璟锵马原荆继武王琼霄雷灵光蔡权伟王雷
Owner INST OF INFORMATION ENG CAS
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More