Signature method based on sm2 algorithm

An algorithm, the technology of elliptic curve algorithm, is applied in the direction of public key of secure communication, digital transmission system, secure communication device, etc. It can solve the problems of lower computing efficiency, too large private key, and signature overflow, so as to improve processing efficiency, The effect of improving computing efficiency

Active Publication Date: 2021-02-09
同智伟业软件股份有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, both the first communication party and the second communication party generate a sub-private key with a length between [1, n-1], the product of which may be greater than n, and the private key will be greater than n-2 in actual operations, resulting in excessive private keys. Large risk of signature overflow
Moreover, the calculation process in the signature calculation process is relatively cumbersome, and additional conditions are required for processing. In the signature output process, multiple network interaction calculations are also required, which reduces the calculation efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature method based on sm2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Such as figure 1 As shown, the general flow of this method is: S1. Both the client and the server use the restricted power method to generate random subkeys a and b, and calculate the inverse elements of a and b for interactive processing to form a constant v, and calculate and output the public key P . S2. The client generates e according to the original text M to be signed, and at the same time randomly generates DH interaction k11, and transmits e and k11 to the server. S3. The server randomly generates a DH interaction k22 and sends it to the client. The client and the server negotiate a temporary key k, and then the client generates a partial signature Q2. S4. The client transmits Q2 to the server, and the server calculates r and s synchronously, and finally outputs the signature value [r, s].

[0035] The specific flow of this method will be described in detail below: this method mainly includes two processes of key generation and signature calculation.

[0036...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The signature method based on the SM2 algorithm of the present invention includes the following steps: S1, the client and the server both generate random subkeys a and b in a power-limited manner, calculate the inverse elements of a and b for interactive processing, form a constant v, and calculate and output the public Key P. S2. The client generates e according to the original text M to be signed, and at the same time randomly generates DH interaction k11, and transmits e and k11 to the server. S3. The server randomly generates a DH interaction k22 and sends it to the client. The client and the server negotiate a temporary key k, and then the client generates a partial signature Q2. S4. The client transmits Q2 to the server, and the server calculates r and s synchronously, and finally outputs the signature value [r, s]. The invention avoids the risk of signature overflow caused by too large private key, further simplifies the algorithm, and improves the operation efficiency.

Description

technical field [0001] The invention relates to a signature method based on SM2 algorithm. Background technique [0002] Digital signature is to generate a series of symbols and codes through some cryptographic operations to form electronic passwords to sign, instead of writing signatures or seals. Technical verification can also be carried out for such electronic signatures. The accuracy of verification is the same as that of general manual signatures and The verification of the stamp is incomparable. Digital signature is currently the most widely used, most mature and operable electronic signature method in e-commerce and e-government affairs. [0003] In order to improve the security of digital signatures, signature algorithms are gradually developed in the direction of less interaction, reducing the number of transmission parameters, and gradually improving the processing efficiency of algorithms. [0004] The Chinese invention patent with the application publication n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0825H04L9/0838H04L9/3066
Inventor 王永起王珂
Owner 同智伟业软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products