Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Shared secret key generation method and device, computer equipment and storage medium

A technology for sharing secrets and keys, applied in the field of cryptographic protocols, which can solve the problem of high certificate management costs

Active Publication Date: 2019-05-28
JUZIX TECH SHENZHEN CO LTD +1
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a shared secret key generation method, device, computer equipment and storage medium to solve the problem of high cost of certificate management in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shared secret key generation method and device, computer equipment and storage medium
  • Shared secret key generation method and device, computer equipment and storage medium
  • Shared secret key generation method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The principle and spirit of the present application will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present application, rather than to limit the scope of the present application in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of this disclosure to those skilled in the art.

[0077] Those skilled in the art know that the embodiments of the present application may be realized as a system, device, method or computer program product. Therefore, the disclosure of the present application can be specifically implemented in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0078] The embodiment of this application provides a meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a shared secret key generation method and device, computer equipment and a storage medium, and the method comprises the steps: obtaining an elliptic curve system parameter and asecurity hash function; generating a main public key and a main private key according to the elliptic curve system parameters; receiving first user identity information returned by the first user side and second user identity information returned by the second user side; generating a first user private key for the first user side according to the elliptic curve system parameters, the main privatekey and the first user identity information, and generating a second user private key for the second user side according to the elliptic curve system parameters, the main private key and the second user identity information; And sending the main public key, the elliptic curve system parameter, the security hash function and the first user private key to the first user side, and sending the main public key, the elliptic curve system parameter, the security hash function and the second user private key to the second user side. According to the scheme, the technical problem of high certificate management cost in the prior art is solved.

Description

technical field [0001] The present application relates to the technical field of cryptographic protocols, in particular to a method, device, computer equipment and storage medium for generating a shared secret key. Background technique [0002] SM2 Elliptic Curve Public Key Cryptography Algorithm is an elliptic curve public key cryptographic algorithm promulgated by the State Cryptography Administration, which determines the algorithms or protocols including data encryption, digital signature and key exchange. Among them, the SM2 key exchange protocol is widely used in key exchange in commercial cryptography applications because of its high security and high efficiency, and it can be applied to two or three optional information transmission negotiations between the two parties. Shared secret key (session key). [0003] Although the SM2 key exchange protocol is safe, efficient and easy to use, it can also provide product and technology standard positioning and standardized r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08H04L9/06
Inventor 林超何德彪谢翔李升林
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products