Unlock instant, AI-driven research and patent intelligence for your innovation.

A cooperative signature and decryption system based on sm9 algorithm

A technology of algorithm and signature data, applied in the field of cryptography, can solve problems such as user information leakage, identity counterfeiting, and information tampering

Active Publication Date: 2022-02-15
STATE GRID E COMMERCE CO LTD +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while users enjoy the convenience brought by the Internet, there may also be corresponding security risks. For example, users may face security risks such as information leakage, identity counterfeiting, and information tampering.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cooperative signature and decryption system based on sm9 algorithm
  • A cooperative signature and decryption system based on sm9 algorithm
  • A cooperative signature and decryption system based on sm9 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0041] Various non-limiting implementations of the present application will be described in detail below with reference to the accompanying drawings.

[0042] see figure 1 , which is a schematic structural diagram of a cooperative signature system based on the SM9 algorithm provided by the embodiment of the present application.

[0043]The collaborative signature...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a cooperative signature and decryption system based on the SM9 algorithm, including a first communication party, a second communication party and auxiliary equipment. The data to be signed is signed in a cooperative signature manner, and the intruder cannot forge the target signature data without knowing the first private key component and / or the second private key component. Moreover, the second private key component stored in the auxiliary device will not be leaked, therefore, using the solution of the embodiment of the application, the second private key component will not be leaked, thus ensuring the security of the user's private key, so that the target Signature data cannot be forged, thereby ensuring the security of users when using the Internet to complete corresponding services. It is precisely because the second private key component will not be leaked that the intruder cannot obtain the correct target decrypted data, thereby ensuring the security of the user when completing the corresponding business by using the Internet.

Description

technical field [0001] This application relates to the field of cryptography, in particular to a collaborative signature and decryption system based on the SM9 algorithm. Background technique [0002] With the popularity of the mobile Internet, users can use the Internet to complete various services such as mobile payment services, online bank transfer services, and electronic contract signing services on terminals such as mobile smart terminals, which brings great convenience to users. However, while users enjoy the convenience brought by the Internet, there may also be corresponding security risks. For example, users may face security risks such as information leakage, identity counterfeiting, and information tampering. Digital signature technology and decryption technology based on public key cryptography is one of the effective means to solve these security risks. [0003] The SM9 elliptic curve identification cryptography algorithm is an identification cryptography sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0825H04L9/0869H04L9/0897H04L9/3066
Inventor 王栋廖会敏玄佳兴汪洋龚政李国民薛真俞果张蕾吕梓童
Owner STATE GRID E COMMERCE CO LTD