SM2-based two-party collaborative signature method and decryption method

A technology for signing messages and ciphertexts, which is applied to public keys for secure communications, encryption devices with shift registers/memory, and key distribution. and the effect of having a greater risk of safety in use

Active Publication Date: 2020-06-19
DATA COMM SCI & TECH RES INST +1
View PDF7 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the above analysis, the present invention aims to provide an SM2-based two-party cooperative signature method and decryption method to solve the problem of relatively large hidden dangers in the storage security and use security of keys in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2-based two-party collaborative signature method and decryption method
  • SM2-based two-party collaborative signature method and decryption method
  • SM2-based two-party collaborative signature method and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, wherein the accompanying drawings constitute a part of the application and together with the embodiments of the present invention are used to explain the principle of the present invention and are not intended to limit the scope of the present invention.

[0042] Abbreviations and key terms:

[0043] f p : A prime field containing p elements.

[0044] E(F p ): F p The set of all rational points (including the point O at infinity) of the upper elliptic curve E.

[0045] (p,a,b,G,n,h): The curve parameters of the SM2 algorithm, where p is a 256-bit prime number; a and b are F p elements in , used to define F p An elliptic curve E on the above; G is the base point, expressed by coordinates G=(x G ,y G ); n is the order of G; h is the cofactor.

[0046] h v ( ): a cryptographic hash function with a message digest length of v bits, and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an SM2-based two-party collaborative signature method and decryption method, and belongs to the technical field of digital signature and decryption. The collaborative signature method comprises the following steps: obtaining a sub-private key of a first communication party and a sub-private key of a second communication party as two-party private keys of a user, and generating a user public key by using the two-party private keys of the user based on SM2; the first communication party uses the user public key to generate a message digest e from a to-be-signed message Mand sends the message digest e to the second communication party, and the second communication party generates a first part signature r according to the message digest e based on SM2 and sends the first part signature r to the first communication party; and the first communication party generates a second part signature s according to the first part signature r and a sub private key of the firstcommunication party, and obtains and outputs a complete signature. Meanwhile, the invention relates to a two-party decryption method based on SM2. According to the embodiment of the invention, the problem that the storage security and the use security of the secret key in the prior art have great hidden dangers is solved.

Description

technical field [0001] The invention relates to the technical field of digital signature and decryption, in particular to an SM2-based two-party cooperative signature method and decryption method. Background technique [0002] As the country vigorously promotes the strategy of domestic independent cryptographic algorithms, the public key cryptographic standard algorithm SM2 has been widely used in important information systems such as finance, electric power, and transportation. With the popularization of the mobile Internet, more and more applications begin to operate on mobile terminals, such as mobile banking and mobile payment. These applications require user network identity authentication and network data encryption to ensure the security of network applications. The common means to solve these security requirements is to use public key cryptography to realize digital signature and public key encryption. When using public key cryptography, it is critical to keep the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/30H04L9/06
CPCH04L9/3247H04L9/3252H04L9/0838H04L9/3066H04L9/0643
Inventor 贾文义张凡黄念念李鸿利
Owner DATA COMM SCI & TECH RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products