A cooperative signature and decryption system based on sm9 algorithm
A technology of algorithm and signature data, applied in the field of cryptography, can solve problems such as user information leakage, identity counterfeiting, and information tampering
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0041] Various non-limiting implementations of the present application will be described in detail below with reference to the accompanying drawings.
[0042] see figure 1 , which is a schematic structural diagram of a cooperative signature system based on the SM9 algorithm provided by the embodiment of the present application.
[0043]The collaborative signature...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


