Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SM2 algorithm collaborative signature and decryption method, device and system

An algorithm and digital signature technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of high cost, poor compatibility, and the common public key generation method does not meet the actual application environment, and achieve resistance to malicious attacks, The effect of protecting user privacy

Active Publication Date: 2019-04-23
深圳市电子商务安全证书管理有限公司
View PDF7 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] For solution 1), the hardware device needs to be adapted and compatible with various types of smart phones, and there are problems of poor compatibility and complicated use, and the cost is relatively high;
[0009] For solution 2), in the process of signature or decryption calculation, the private key needs to be decrypted and used, which causes the complete private key to appear in the memory, and the attacker may export it from the mobile phone memory;
[0010] For solution 3), there are problems in the existing solutions that the common public key generation method does not conform to the actual application environment, the common signature method lacks input verification, and the cooperative decryption algorithm has poor privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2 algorithm collaborative signature and decryption method, device and system
  • SM2 algorithm collaborative signature and decryption method, device and system
  • SM2 algorithm collaborative signature and decryption method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0210] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0211] In order to meet the application requirements of electronic authentication service systems, the State Cryptography Administration has released the SM2 elliptic curve public key cryptography algorithm, including SM2-1 elliptic curve digital signature algorithm, SM2-2 elliptic curve key agreement protocol, SM2-3 elliptic curve encryption algorithm.

[0212] For the SM2 signature algorithm, see "GM / T 0003.2-2012SM2 Elliptic Curve Publ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a SM2 algorithm collaborative signature and decryption method, device and system. The collaborative signature method comprises the following steps: computing a first elliptic curve group element set and sending the a server-side to check; checking a second elliptic curve group element set fed back by the server-side, and computing a third elliptical curve group element based on the first elliptic curve group element set and the second elliptic curve group element set; computing a first numerical value according to a user information hash value, a to-be-signed message and an abscissa of the third elliptical curve group element; generating a second numerical value according to the first numerical value, the first random number and a client private key component, and sending the second numerical value to the server-side; receiving a third numerical value computed according to the second numerical value, the second random number and the server-side private key component; and synthesizing as a SM2 digital signature according to the first numerical value and the third numerical value. The method disclosed by the invention has features of verification input and provable security, more conforms to the actual application environment, and can protect the user privacy better.

Description

technical field [0001] The invention relates to the technical field of digital signatures, in particular to a SM2 algorithm collaborative signature and decryption method, device and system. Background technique [0002] On December 17, 2010, in order to meet the application requirements of the electronic certification service system, the State Cryptography Administration released the SM2 elliptic curve public key cryptographic algorithm, including the SM2-1 elliptic curve digital signature algorithm and the SM2-2 elliptic curve key agreement protocol , SM2-3 elliptic curve encryption algorithm. Among them, the SM2 signature algorithm can be found in Part 2 of "GM / T0003.2-2012 SM2 Elliptic Curve Public Key Cryptography Algorithm": Digital Signature Algorithm. [0003] Nowadays, more e-commerce and transactions are transitioning and developing to the mobile Internet, and the demand for using digital certificates for electronic signatures in mobile terminals is increasing day ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/3252
Inventor 潘金昌王志辉梁珍权
Owner 深圳市电子商务安全证书管理有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products