Certificate-free signature method based on national secret SM2

A certificate-free, state-secret technology, applied in the field of information security, can solve problems such as inability to protect keys and poor security protection capabilities of mobile terminals, and achieve the effect of improving fairness and ensuring security.

Active Publication Date: 2019-01-25
ZHEJIANG GONGSHANG UNIVERSITY
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of the information age and the application of big data, mobile smart terminals have been widely popularized, and it is becoming more and more common for users to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificate-free signature method based on national secret SM2
  • Certificate-free signature method based on national secret SM2
  • Certificate-free signature method based on national secret SM2

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples.

[0035] The present invention proposes a certificateless signature method based on a national secret algorithm, and a specific description is given below.

[0036] Symbols and definitions

[0037]

[0038]

[0039] implementation steps such as Figure 1-Figure 4 Shown:

[0040] 1. System establishment: input security parameter k, KGC (Key Generation Center) selects a large prime number p and elliptic curve: E p (a,b):y 2 =x 3 +ax+b(mod p), where a, b, x and y are all in the finite field GF p Medium, and satisfy: 4a 3 +27b 2 (mod p)≠0. in E p In (a,b), select generator point P. define G 1 is generated by P in E p The additive cyclic group on (a, b), the order is a prime number n that meets the security requirements, and the SM3 cryptographic hash algorithm used...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a certificate-free signature method based on a national secret algorithm. At the time of signature generation, B calculates the parameters participate in signature generation according to the secret parameters randomly selected to participate in signature generation, and send the parameters to A. A randomly selects the secret parameters involved in signature verification, and generates a message combining the secret parameters to send to B. During signature verification, B verifies whether A's signature public key is valid according to the secret parameters generated byparticipating signatures. If it is invalid, the verification fails, otherwise, the verification continues. B calculates a parameter and send it to A. A verifies whether B completes the signature verification according to the correct steps through this parameter, and sends a parameter containing the secret value if B conforms to the correct execution step, otherwise, terminates the signature. B receives the verification parameters of A and participates in the subsequent signature verification, and finally produces the result. The invention can prevent an adversary from controlling one of the parties to seek personal gain in the process of signature and verification in which the server cooperates with the mobile terminal.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a certificate-less signature method based on a national secret algorithm, and both signatories are required to participate in the signature generation and verification process. Background technique [0002] With the development of the information age and the application of big data, mobile smart terminals have been widely popularized, and it is becoming more and more common for users to use mobile terminals to access the network to process services. Therefore, a secure and efficient terminal-server cooperative signature scheme is needed to ensure the security of network services. [0003] Based on this, the present invention proposes a certificateless signature method based on a national secret algorithm. The signature public and private keys do not need to be distributed by a trusted center. Even if the adversary obtains part of the private key, the complete private...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/3247
Inventor 韩舒韩嵩王雪李芝敏
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products