SM2 digital signature generation method and system
A digital signature, integer technology, applied in the field of information security, can solve problems such as low security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0130] It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.
[0131] refer to figure 1 , figure 1 This is a schematic flowchart of the first embodiment of a method for generating an SM2 digital signature according to the present invention.
[0132] In this embodiment, the method includes the following steps:
[0133] Step S01: The first terminal selects two integers x from the set {1,2,...,n-1} 1 and k 1 , and the x 1 As the first part of the private key, the k 1 As the first random number, wherein, the n is the order of the elliptic curve point group used in the SM2 cryptographic operation;
[0134] Step S02: The second terminal selects two integers x from the set {1,2,...,n-1} 2 and k 2 , the x 2 As the second part of the private key, the k 2 as the second random number;
[0135] Step S03: the first terminal according to the first partial private key x 1 Calc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



