Multi-distributed SM9 decryption method, medium and key generation method

A technology of key generation and key generation center, which is applied to the public key and key distribution of secure communication, and can solve problems such as the inability to obtain encryption keys

Active Publication Date: 2018-08-17
JUZIX TECH SHENZHEN CO LTD +1
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to solve the above problems, providing a multi-distributed SM9 decryption method and medium and key generation method, a plurality of communicat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-distributed SM9 decryption method, medium and key generation method
  • Multi-distributed SM9 decryption method, medium and key generation method
  • Multi-distributed SM9 decryption method, medium and key generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048]The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. Note that the aspects described below in conjunction with the drawings and specific embodiments are only exemplary, and should not be construed as limiting the protection scope of the present invention.

[0049] Before starting to describe the technical solutions of the embodiments of the present invention, the symbols and their definitions that will appear in the following description are listed first.

[0050] KGC: Key Generation Center. It is a trusted organization, mainly responsible for generating system parameters, master private key and encryption key.

[0051] KDF(·): key derivation function.

[0052] MAC(·): Message authentication code function.

[0053] G 1 ,G 2 : The additive cyclic group of order prime q.

[0054] G T : The multiplicative cyclic group of order prime q.

[0055] e: from G 1 ×G 2 to G T bilinear pairing.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-distributed SM9 decryption method, a medium and a key generation method. Multiple communication methods jointly complete a message decryption process under the condition of not leaking respective part of encryption keys and being unable to acquire the complete encryption key. The technical scheme of the method is as follows: a key generation center (KGC) generates the corresponding part of keys for communication parties participating into an SM9 decryption system. After the key is received, an n-th communication party An computes a first temporary variable, andreturns the first temporary variable back to the An-1. After the An-1 receives w1, a second temporary variable is computed, and returned back to An-2, and so on, until the A1 receives the wn-1, the n-th temporary variable is computed, and is subjected to decryption computing in a classified manner according to a plaintext encryption method, and finally plaintext M' is output.

Description

technical field [0001] The invention relates to the technical field of ciphers, in particular to an SM9 decryption method and medium based on multi-party co-generation. Background technique [0002] With the rapid development of science and technology, network platforms such as the Internet of Things provide a powerful computing platform for the storage and transmission of big data, and also provide convenience for people's daily life. However, data security and privacy issues have become a matter of great concern. In a big data environment, it is a huge challenge to realize secure storage, transmission and use of messages, prevent message leakage, and ensure message integrity and confidentiality. [0003] Digital signature and encryption and decryption technology based on public key cryptography are the key technologies to realize message confidentiality, integrity and non-repudiation, and have been widely used in network communication, e-commerce and e-government and othe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/08
CPCH04L9/085H04L9/0861H04L9/0891H04L9/3033H04L9/3073
Inventor 何德彪马米米谢翔孙立林李升林
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products