Digital signature method and system based on SM2-based identity base

A digital signature and identity technology, applied in the field of information security, can solve the time-consuming problems of certificate management SM9 identification signature algorithm

Active Publication Date: 2018-11-13
WUHAN UNIV
View PDF2 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide an identity-based digital signature method and system based on SM2 to solve the problem of certificate ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature method and system based on SM2-based identity base
  • Digital signature method and system based on SM2-based identity base
  • Digital signature method and system based on SM2-based identity base

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0115] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0116] 1. Symbols and definitions in the embodiments of the present invention

[0117] KGC: Key Generation Center.

[0118] A, B: users.

[0119] ID A : The identity of the user.

[0120] ENTLA:ID A The bit length converted into two bytes.

[0121] q: Large prime number.

[0122] f q : A finite field containing q elements.

[0123] a, b: F q elements in , which define F q An elliptic curve E on

[0124] E(F q ): F q The set of all rational points (including the point O at infinity) of the upper elliptic curve E.

[0125] #E(F q ): E(F q ) on the number of points, called the elliptic curve E(F q ) order.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a digital signature method and a digital signature system based on an SM2-based identity base. The method firstly generates system parameters and system master, public, and private keys, and the user sends the identity identifier to the KGC for registration to obtain a signature private key, and then generates and verifies the digital signature of message M by using the signature private key. In the signature process of the invention, since a new type of user private key is generated based on the unchangeable overall architecture of the SM2 signature algorithm, the user's signature private key is generated based on the identity of the user without public key certificate, maintenance and management of the public key certificate as well as time-consuming calculation,thereby ensuring that the signature method of the invention has the characteristics such as low complexity, high security, and easy verification.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an SM2-based identity-based digital signature method and system. Background technique [0002] Digital signature is a kind of security protection technology that emerges with the development of information network technology. Its purpose is to realize the function of traditional paper signature or seal through technical means, and it is used to identify the identity of the signatory and verify the content of an electronic data. recognition. It can also verify whether the original text of the document has changed during the transmission process, ensuring the integrity, authenticity and non-repudiation of the transmitted electronic document. Digital signature is an important part of public key cryptography and plays an important role in many occasions. [0003] SM2 Elliptic Curve Public Key Cryptography Algorithm is an elliptic curve public key cryptographic algorith...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3066H04L9/3236H04L9/3252
Inventor 何德彪张佳妮陈泌文张宇波
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products