A No-Certificate Secure Signature Method Based on SM2 Algorithm

A secure signature, certificateless technology, applied in the field of public key cryptography, which can solve problems such as undiscovered, difficult signing, key sharing and joint signing difficulties.

Active Publication Date: 2020-07-03
北京百旺信安科技有限公司 +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the national secret SM2 signature algorithm, due to the particularity of its algorithm, it is difficult to realize key sharing and joint signature
In addition, for a certificateless public key cryptosystem with unequal pair operation (see patent application number 201410772127.5), it is more difficult for multiple parties to jointly complete the signature based on the SM2 algorithm, and no method to solve this application requirement has been found yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A No-Certificate Secure Signature Method Based on SM2 Algorithm
  • A No-Certificate Secure Signature Method Based on SM2 Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention proposes a secure signature scheme for the certificateless public key cryptosystem based on the SM2 algorithm. The following describes the implementation of the present invention in detail based on the drawings.

[0059] figure 1 Shown is the implementation process of key generation based on certificateless public key cryptosystem. The elliptic curve parameters on the finite field involved in the present invention are set according to the national secret SM2 algorithm standard. The elliptic curve on the finite field used is denoted as E(Fq), its base point is G, and the order of G is a prime number n, h (x) is the SM3 hash function.

[0060] The certificateless key generation center is called KGC, and the N users who share the key are denoted as U 1 ,U 2 ,...,U N , They share a user identification ID.

[0061] Step (1) said KGC sets the system private key s M And the system public key P pub , Complete the system establishment.

[0062] User U in step (2)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A certificateless security signature method based on an SM2 algorithm belongs to the application field of public key cryptography. The method is used to solve the problem on how to generate private keys of N (N>=2) users in a certificateless public key cryptography system without bilinear pairing operation on an elliptic curve and complete SM2 signature of one message through the N users. In the invention, each user cannot acquire the private key information of other users, a user subset containing less than N users cannot generate a complete digital signature, and the security of signature is fully ensured. Attackers cannot forge a valid signature without stealing all the N private keys. The security signature process is simple. The computation efficiency is high. The signature result accords with the standard of the national cipher SM2 signature algorithm.

Description

Technical field [0001] The invention belongs to the field of public key cryptography, and particularly relates to a safe signature method for a certificateless authentication system based on the national secret SM2 algorithm. Background technique [0002] Public key cryptography has been widely used today with the highly developed computer technology and network technology. Digital signature technology and public key encryption technology have penetrated into people's daily life. In order to ensure the uniqueness of the digital signature and the security of the signature private key, the private key owner usually saves the signature private key in the cryptographic device, and the signature calculation is also performed in the cryptographic device. The cryptographic device used is usually a cryptographic machine on the server side, and a USBKEY with CPU and an IC card on the client side. In cloud computing environments and mobile phone mobile terminals, it is very inconvenient ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/083H04L9/085H04L9/3066H04L9/3247
Inventor 熊荣华其他发明人请求不公开姓名
Owner 北京百旺信安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products