Information service entity cross-domain authentication method based on SM2 cryptographic algorithm
A cryptographic algorithm and information service technology, which is applied in the cross-domain authentication of information service entities based on the SM2 cryptographic algorithm, and in the field of cross-domain identity verification process, can solve the problems of slow authentication speed and low security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0069] Attached below figure 1 , to further describe the implementation steps of the present invention.
[0070] Step 1, generate group public key and group private key.
[0071] The key generation center randomly selects an element c∈Z q , where ∈ means belonging to the symbol, Z q Represents an integer string of order q, where q represents a large prime number.
[0072] The key generation center takes the element c as the group private key s and saves it, and uses the product of the group private key s and the base point G as the group public key, where G represents the base point of order n on the elliptic curve, and n represents a large prime number.
[0073] When q is an odd prime number, it is required that q>2 191 ; when q is a power of 2 m When , it is required that m>192 and be a prime number, when q is an odd prime number, the elements in the prime field are represented by integers 0, 1, 2, q-1; when q is a power of 2 m When , the binary extension domain F of...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
