A No-Certificate Secure Signature Method Based on SM2 Algorithm
A secure signature, certificateless technology, applied in the field of public key cryptography, which can solve problems such as undiscovered, difficult signing, key sharing and joint signing difficulties.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0058] The present invention proposes a secure signature scheme for the certificateless public key cryptosystem based on the SM2 algorithm. The following describes the implementation of the present invention in detail based on the drawings.
[0059] figure 1 Shown is the implementation process of key generation based on certificateless public key cryptosystem. The elliptic curve parameters on the finite field involved in the present invention are set according to the national secret SM2 algorithm standard. The elliptic curve on the finite field used is denoted as E(Fq), its base point is G, and the order of G is a prime number n, h (x) is the SM3 hash function.
[0060] The certificateless key generation center is called KGC, and the N users who share the key are denoted as U 1 ,U 2 ,...,U N , They share a user identification ID.
[0061] Step (1) said KGC sets the system private key s M And the system public key P pub , Complete the system establishment.
[0062] User U in step (2)...
PUM

Abstract
Description
Claims
Application Information

- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com