Collaborative signature and decryption method, apparatus and system of SM2 algorithm

An algorithm and hash algorithm technology, applied in the field of cryptography, can solve problems such as the inability to protect user privacy, and achieve the effect of less application requirements, low delay, and less interaction

Active Publication Date: 2017-09-22
GUANGDONG CERTIFICATE AUTHORITY +1
View PDF3 Cites 92 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a SM2 algorithm cooperative signature and decryption method, de...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Collaborative signature and decryption method, apparatus and system of SM2 algorithm
  • Collaborative signature and decryption method, apparatus and system of SM2 algorithm
  • Collaborative signature and decryption method, apparatus and system of SM2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0081] In order to solve the problem that traditional technologies cannot protect user privacy and resist malicious attacks, the present invention provides an embodiment 1 of an SM2 algorithm collaborative signature method implemented from the perspective of the first communication party; figure 1 It is a schematic flow chart of Embodiment 1 of the SM2 algorithm cooperative signature method implemented from the perspective of the first communication party in the present invention; as figure 1 As shown, the following steps may be included:

[0082] Step S110: Generate a message digest of the message to be signed according to a preset cryptographic hash algorithm;

[0083] Step S120: receiving the first elliptic curve group element fed back by the second communication party based on the first public key parameter and the selected random number; generating the first partial signature according to the message digest and the first elliptic curve group element;

[0084] Step S130: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a collaborative signature and decryption method, apparatus and system of an SM2 algorithm. The collaborative signature method of the SM2 algorithm implemented from the angle of a first communication party comprises the following steps: generating a message abstract of a to-be-singed message according to a preset password hash algorithm; receiving a first elliptic curve group element fed back by a second communication party based on a first public key parameter and a selected random number; generating a first part signature according to the message abstract and the first elliptic curve group element; performing modular arithmetic based on the first part signature to generate a confused intermediate result, and transmitting the confused intermediate result to the second communication party; when the intermediate signature fed back by the second communication party according to the confused intermediate result is received, generating a second part signature according to the intermediate signature and the first part signature; and obtaining a complete SM2 digital signature according to the first part signature and the second part signature.

Description

technical field [0001] The invention relates to the technical field of cryptography, in particular to an SM2 algorithm cooperative signature and decryption method, device and system. Background technique [0002] Elliptic Curve Cryptography (ECC for short) is a public key system based on mathematical problems of elliptic curves defined over finite fields. The SM2 algorithm refers to the elliptic curve public key cryptography algorithm specified in the "GM / T 0003-2012 SM2 Elliptic Curve Public Key Cryptography Algorithm" standard formulated by the State Cryptography Administration, and is a specific algorithm of the ECC cryptosystem. [0003] In order to improve the security of the private key in the cloud computing environment, the traditional technology proposes to store part of the private key on both sides of the communication, and the two parties can jointly sign or decrypt the message. Neither party can obtain any information about the private key of the other party. ,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3066H04L9/3252
Inventor 张永强刘镪
Owner GUANGDONG CERTIFICATE AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products