SM2-based both side signature method and system

A technology for signing messages and base points, which is applied in the field of information security and can solve problems such as key loss, large amount of data, and reduced signature efficiency.

Active Publication Date: 2019-03-08
中电科网络安全科技股份有限公司
View PDF9 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On less protected endpoints, this increases the risk of key loss
For example, the loss of the mobile phone, the eavesdropping of the algorithm operation process, etc. will lead to the loss of the key. How to safely protect the key of the weak terminal is a very important problem in the implementation of the cryptographic algorithm.
[0003] The existing solution is to use the two-party signature method, but the common problem is that in the entire interactive signature operation, the amount of calculation is large and the amount of communication data is also large, which reduces the efficiency of signature generation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2-based both side signature method and system
  • SM2-based both side signature method and system
  • SM2-based both side signature method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0061] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0062] Such as figure 1 As shown, the embodiment of the present invention provides a two-party signature method based on SM2, the first communication party and the second communication par...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security, and the embodiment discloses an SM2-based both side signature method and system. By adoption of the technical scheme provided by the invention, a part of private key can be separately stored in both communication sides, a signature or decryption and other operations can only be performed on a message by the cooperation of the both sides, neither of the both communication sides can obtain any information of the private key of the other side, therefore an attacker cannot forge the signature or decrypt the ciphertext if invading any of the both sides, and the both communication sides need to transmit two data to the opposite side in the signature interaction, so that the data communication traffic and the data calculation amount are low, and the signature efficiency is higher.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an SM2-based two-party signature method and system. Background technique [0002] In general, complete key information needs to be invoked when running a cryptographic algorithm, so the key needs to be stored directly in memory. On less protected endpoints, this increases the risk of key loss. For example, the loss of the mobile phone, the eavesdropping of the algorithm operation process, etc. will lead to the loss of the key. How to safely protect the key of the weak terminal is a very important problem in the implementation of the cryptographic algorithm. [0003] The existing solution is to use the two-party signature method, but the common problem is that in the entire interactive signature operation, the amount of calculation is large and the amount of communication data is also large, which reduces the efficiency of signature generation. Contents of the inve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3066H04L9/3252
Inventor 张立廷王现方潘文伦
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products