Check patentability & draft patents in minutes with Patsnap Eureka AI!

SM2 digital signature generation method and system

A digital signature, integer technology, applied in the field of information security, can solve problems such as low security

Active Publication Date: 2018-01-26
确信信息股份有限公司
View PDF6 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of the present invention is to provide a SM2 digital signature generation method and system, aiming to solve the problem of low security in the prior art when the message signing party uses the private key to sign the message

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2 digital signature generation method and system
  • SM2 digital signature generation method and system
  • SM2 digital signature generation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0130] It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0131] refer to figure 1 , figure 1 This is a schematic flowchart of the first embodiment of a method for generating an SM2 digital signature according to the present invention.

[0132] In this embodiment, the method includes the following steps:

[0133] Step S01: The first terminal selects two integers x from the set {1,2,...,n-1} 1 and k 1 , and the x 1 As the first part of the private key, the k 1 As the first random number, wherein, the n is the order of the elliptic curve point group used in the SM2 cryptographic operation;

[0134] Step S02: The second terminal selects two integers x from the set {1,2,...,n-1} 2 and k 2 , the x 2 As the second part of the private key, the k 2 as the second random number;

[0135] Step S03: the first terminal according to the first partial private key x 1 Calc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SM2 digital signature generation method and system. The method comprises the following steps: a first terminal and a second terminal participating in digital signature select two integers from a set {1, 2,... , n-1}, the first terminal and the second terminal separately calculate respective corresponding partial public keys according to the selected integers and send thesame to the opposite side, the first terminal and the second terminal calculate verification public keys according to the received partial public keys; at a digital signature generation stage, the first terminal sends a first calculated temporary public key and an encrypted ciphertext to the second terminal, the second terminal sends a second calculated temporary public key and a to-be-decryptedciphertext to the first terminal, the first terminal decrypts the to-be-decrypted ciphertext and calculates digital signature according to an own private key, and outputs a complete digital signatureafter verifying the generated digital signature. As the signature generation process requires the participation of two signature parties and no leakage of the private keys, the security of the privatekeys is ensured, and the fairness of the both signature parties is improved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method and system for generating an SM2 digital signature. Background technique [0002] Elliptic curve public key cryptography (SM2) is a cryptographic algorithm issued by the State Cryptography Administration of China. SM2 clearly specifies the digital signature algorithm, public key encryption algorithm and key exchange protocol of the SM2 algorithm. Among them, the digital signature algorithm of the SM2 algorithm includes a generation algorithm and a verification algorithm, and is applied to the reliable message transmission in the message transmission process and the verification of the legal person using the message. The digital signature algorithm of SM2 includes a one-to-one corresponding public key and private key, wherein the private key is used to generate a digital signature for the message to be signed, and the public key is used to verify...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/00H04L29/06
Inventor 何德彪张语荻孙金龙
Owner 确信信息股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More