Supercharge Your Innovation With Domain-Expert AI Agents!

Efficient online and offline encryption method based on SM9 public key encryption algorithm

A public key encryption algorithm, online and offline technology, applied to the public key and key distribution of secure communication, can solve problems such as high computing resource requirements, and achieve the effect of improving encryption efficiency, high efficiency, and fast data encryption

Active Publication Date: 2020-08-25
BEIJING HUADA INFOSEC TECH
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides an efficient online and offline encryption method based on the SM9 public key encryption algorithm to solve the problem of high requirements for the sender's computing resources in the SM9 public key encryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient online and offline encryption method based on SM9 public key encryption algorithm
  • Efficient online and offline encryption method based on SM9 public key encryption algorithm
  • Efficient online and offline encryption method based on SM9 public key encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The embodiments will be described in detail hereinafter, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following examples do not represent all implementations consistent with this application. These are merely examples of systems and methods consistent with aspects of the present application as recited in the claims.

[0062] This application provides an efficient online and offline encryption method based on the SM9 public key encryption algorithm. The data encryption algorithm is divided into two sub-algorithms. The encryptor first runs offline without knowing the encrypted data and the recipient. Encryption algorithm, generate offline ciphertext and store it. This process does most of the heavyweight operations needed to encrypt data ahead ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an efficient online and offline encryption method based on an SM9 public key encryption algorithm, which optimizes a ciphertext generation algorithm in a data encryption processon the basis of not changing the overall architecture of the SM9 public key encryption algorithm, and decomposes the ciphertext generation algorithm into two sub-algorithms: an offline encryption algorithm and an online encryption algorithm. Under the condition that encrypted data and a receiver identifier do not need to be known, a sender can calculate part of encryption operation in advance through the offline encryption algorithm, completes most of high-overhead operation, and generates an offline ciphertext. After the encrypted data and the receiver identifier are known, the sender quickly encrypts the data by using an offline ciphertext through the online encryption algorithm to generate an SM9 public key encrypted ciphertext. The process only requires a small amount of lightweight computation, and has low requirements for computing resources. According to the method, the security of data transmission can be ensured, the requirement for computing resources of a sender is low, themethod is particularly suitable for an application environment with limited computing resources, and the application of an SM9 public key encryption algorithm in practice is effectively promoted.

Description

technical field [0001] This application relates to the technical field of information security, and in particular to an efficient online and offline encryption method based on the SM9 public key encryption algorithm. Background technique [0002] Data encryption is an effective method to protect data confidentiality. The plaintext data is hidden through technical means, so that the stored or transmitted data is a garbled code whose effective content cannot be identified, also known as ciphertext. Even if the attacker obtains the ciphertext, it cannot be decrypted correctly, and only authorized users can recover the plaintext content by using the decryption key. Encryption ensures that data content will not be leaked during network transmission and protects the confidentiality of transmitted data. Data encryption is a very important part of public key cryptography, which is widely used in military, commercial and other fields to protect the confidentiality of data. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L29/06
CPCH04L9/0819H04L9/0861H04L9/3033H04L9/3073H04L63/0428Y02D30/50
Inventor 赖建昌黄欣沂孙京涛汪朝晖何德彪
Owner BEIJING HUADA INFOSEC TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More