Supercharge Your Innovation With Domain-Expert AI Agents!

SM2 algorithm signature method applied to CS architecture

An algorithm and response code technology, applied in the field of cryptography, can solve the problems of the lack of a mechanism for the server to actively verify the identity of the client entity, and achieve the effects of improving signature security, less interaction, and low latency

Active Publication Date: 2018-11-02
DATA ASSURANCE & COMM SECURITY CENT CHINESE ACADEMY OF SCI
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The reason for this risk is that when the SM2 private key is synthesized each time, there is no mechanism for the server to actively verify the identity of the client entity, but blindly believe that the holder of the original client sub-private key is the legitimate user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2 algorithm signature method applied to CS architecture
  • SM2 algorithm signature method applied to CS architecture
  • SM2 algorithm signature method applied to CS architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0058] Parameter Description:

[0059] SM2 curve parameters, the elliptic curve E is an elliptic curve defined on the finite field Fq, and G is the base point of order n on the elliptic curve E.

[0060] [*] means point multiplication operation, that is, to calculate k times points of the base point G of order n on the elliptic curve E;

[0061] Elliptic curve point (x1, y1)=k[*]G, [*] means point multiplication operation, that is, k times points of point G on the elliptic curve are calculated;

[0062] figure 1 It is a flow chart of an example of the SM2 signature method for unilaterally uploading single-factor authentication in the present invention.

[0063] Step 11: The client concatenates Z, M, to form M', calculates Hash(M'), takes the calc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a SM2 algorithm signature method applied to CS architecture. The method comprises the following steps: 1) a client generates a sub private key D1, a server generates a sub private key D2; 2) the client generates message abstract e of a to-be-signed message M, generates a signature request as shown in description, and sends the e' to a server, and b is the password set by the client when registering to the server; 3) the server extracts the password b from e' and verifies whether the password b is correct, and ends the signature if the password b is error, and feeds backconfirm information to the client if the password b is correct; the client generates a first part signature Q1 and sends the same to the server; 4) the server generates the second part signature r according to the Q1 and the message abstract e, and generates the third part signature s2 and the fourth signature s3 according to D2, and sends the r, s2 and s3 to the client; and 5) the client generates the signature of the message M according to D1, r, s2 and s3. The security of the signature algorithm is improved.

Description

technical field [0001] The invention relates to the field of encryption, in particular to an SM2 algorithm signature method applied to a CS framework. Background technique [0002] At present, digital signature and encryption and decryption technologies based on public key cryptography have been widely used in e-commerce, identity authentication and other applications, and have become an important tool to ensure information security, and the security of private keys is the basis for ensuring the security of these applications. [0003] In order to improve the security of the private key, the threshold cryptography algorithm splits the private key and distributes it in different physical devices to avoid direct storage and use of all private key information. For example, in a (c, n) threshold signature scheme, the private key can be distributed among n members, among which t or more members can cooperate to complete the signature, but less than t members cannot complete the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0825H04L9/3215H04L9/3228H04L9/3231H04L9/3247H04L9/3271H04L67/01
Inventor 林璟锵马原吴鑫莹陈天宇荆继武
Owner DATA ASSURANCE & COMM SECURITY CENT CHINESE ACADEMY OF SCI
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More