Addition key segmentation-based SM2 signature method

A key and addition technology, applied in the field of encryption

Active Publication Date: 2018-01-23
北京无字天书科技有限公司
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the rapid development of my country's mobile e-commerce, service methods based on UsbKey and other hardware devices are difficult to be recognized by everyone in the field of mobile terminals. Therefore, effective protection of private keys in insecure environments such as mobile devices is currently a challenge. major problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Addition key segmentation-based SM2 signature method
  • Addition key segmentation-based SM2 signature method
  • Addition key segmentation-based SM2 signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The technical solutions in the embodiments of the present invention will be clearly and completely described below. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0059] See figure 1 , figure 2 , a signature key generation method disclosed in the present invention, comprising:

[0060] S1 Client A generates its own sub-private key d A : Client A generates a random number between [1, n-1], and uses the generated random number as d A , i.e. there is :D A ∈[1,n-1], where n represents the order of the base point G of the elliptic curve;

[0061] S2 server B generates its own sub-private key d B : Server B generates a random number between [1, n-1], and uses the generated random number as d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an addition key segmentation-based SM2 signature method. According to the method, a private key is split into two private key components, wherein one private key component islocated at a server end and the other private key component is located at a client end. Therefore, each of two communication parties cannot obtain the complete private key, so that the storage security of the private key is ensured. Both the server end and the client end need to participate in the signature operation process, while any one of the server end and the client end cannot independentlycomplete the signature of the private key. As a result, the usage safety of the private key is ensured.

Description

technical field [0001] The invention relates to the field of encryption, in particular to an SM2 signature method based on additive key division. Background technique [0002] At present, digital signature technology based on public key cryptography has been widely used in e-commerce, identity authentication and other applications, and has become an important tool to ensure information security, and the security and use of private keys are the basis for ensuring the security of these applications. With the rapid development of my country's mobile e-commerce, service methods based on UsbKey and other hardware devices are difficult to be recognized by everyone in the field of mobile terminals. Therefore, effective protection of private keys in insecure environments such as mobile devices is currently a challenge. major problem. Contents of the invention [0003] The purpose of the present invention is to provide an SM2 signature method based on additive key division to addre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/30
Inventor 袁峰蒋楠药乐
Owner 北京无字天书科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products