Check patentability & draft patents in minutes with Patsnap Eureka AI!

sm2 collaborative digital signature method and device

A digital signature and algorithm technology, applied in the field of data processing, can solve problems such as the inability to meet the encryption security requirements of the client and server, and achieve the effects of improving security and reliability, confidentiality, and security and confidentiality

Active Publication Date: 2022-03-15
晟安信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, due to the SM2 digital signature method in the prior art, if the transmitted data is intercepted during data transmission, the intercepted party may deduce the shared secret held by one or both of the two ends of the transmission. Therefore, The existing algorithm cannot meet the encryption security requirements between the client and the server, or between the server and the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • sm2 collaborative digital signature method and device
  • sm2 collaborative digital signature method and device
  • sm2 collaborative digital signature method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0090] Considering that the SM2 collaborative digital signature method in the prior art cannot meet the encryption security requirements between the client and the server, or between the server and the server, this application provides a SM2 collaborative digital signature method with the client as the execution subject , the SM2 collaborative digital signatur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides an SM2 collaborative digital signature method and device, the method includes: generating a first random array after completing key splitting with a server sharing the same SM2 algorithm, and triggering the server to generate a second random array, according to the The first random array performs data interaction with the server applying the second random array, determines the second shared sub-secret corresponding to the target data, and enables the server to obtain the first shared sub-secret corresponding to the target data Secretly, the cooperative signature of the target data is completed jointly with the server. This application can effectively improve the confidentiality of data transmission during the SM2 digital signature process, so that even if the data is intercepted during transmission, it can ensure that the confidential information of the client and server at both ends of the signature cannot be known.

Description

technical field [0001] The present application relates to the technical field of data processing, in particular to an SM2 collaborative digital signature method and device. Background technique [0002] With the rapid development of science and technology, there are more and more application scenarios for file data exchange through the Internet. Therefore, digital signatures have also emerged as the times require, becoming an effective means of confidentiality and authentication for Internet data exchange to meet the needs of the Internet. Confidentiality, integrity, identity authentication and authorization, and non-repudiation requirements. Among various digital signature algorithms, the digital signature algorithm in the SM2 algorithm has also become a key research topic among many digital signature algorithms because of its advantages that cannot be ignored. [0003] In the prior art, the application of the SM2 digital signature method usually uses the Shamir Secret Sha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 商建伟
Owner 晟安信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More