Certificateless security signature method based on SM2 algorithm

A security signature, certificateless technology, applied in the field of public key cryptography, which can solve the problems of key sharing and joint signature difficulties, undiscovered, difficult signatures, etc.

Active Publication Date: 2017-10-13
北京百旺信安科技有限公司 +1
View PDF9 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the national secret SM2 signature algorithm, due to the particularity of its algorithm, it is difficult to realize key sharing and joint signature
In addition, for a certificateless public key cryptosystem with unequal pair operation (see patent application number 201410772127.5), it is more difficult for multiple parties to jointly complete the signature based on the SM2 algorithm, and no method to solve this application requirement has been found yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless security signature method based on SM2 algorithm
  • Certificateless security signature method based on SM2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention proposes a secure signature scheme for a certificateless public key cryptosystem based on the SM2 algorithm, and the implementation of the present invention will be described in detail below with reference to the accompanying drawings.

[0059] figure 1 Shown is the key generation implementation process based on the certificateless public key cryptosystem. The elliptic curve parameters on the finite field involved in the present invention are set by the national secret SM2 algorithm standard, and the elliptic curve on the finite field used is denoted as E (Fq), and its base point is G, and the order of G is prime number n, h (x) is the SM3 hash function.

[0060] The non-certificate key generation center is called KGC, and the N users who share the key are respectively recorded as U 1 ,U 2 ,...,U N , they share a user ID.

[0061] The KGC in step (1) sets the system private key s M and system public key P pub , to complete the system establi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A certificateless security signature method based on an SM2 algorithm belongs to the application field of public key cryptography. The method is used to solve the problem on how to generate private keys of N (N>=2) users in a certificateless public key cryptography system without bilinear pairing operation on an elliptic curve and complete SM2 signature of one message through the N users. In the invention, each user cannot acquire the private key information of other users, a user subset containing less than N users cannot generate a complete digital signature, and the security of signature is fully ensured. Attackers cannot forge a valid signature without stealing all the N private keys. The security signature process is simple. The computation efficiency is high. The signature result accords with the standard of the national cipher SM2 signature algorithm.

Description

technical field [0001] The invention belongs to the field of public key cryptography, and in particular relates to a secure signature method of a certificateless authentication system based on the national secret SM2 algorithm. Background technique [0002] Public key cryptography has been widely used in today's highly developed computer technology and network technology. Digital signature technology and public key encryption technology have penetrated into people's daily life. In order to ensure the uniqueness of the digital signature and the security of the signature private key, usually the private key owner saves the signature private key in the cryptographic device, and the signature operation is also executed in the cryptographic device. The cryptographic device used is usually a cryptographic machine on the server side, and a USBKEY with a CPU and an IC card on the client side. In environments such as cloud computing and mobile terminals, it is inconvenient to use t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/083H04L9/085H04L9/3066H04L9/3247
Inventor 熊荣华其他发明人请求不公开姓名
Owner 北京百旺信安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products