Supercharge Your Innovation With Domain-Expert AI Agents!

SM9 key generation method, device and system and readable storage medium

A key generation and private key technology, applied in encryption devices with shift registers/memory, transmission systems, digital transmission systems, etc., can solve problems such as high security risks and private key leakage, and achieve the effect of improving security

Active Publication Date: 2020-11-06
中电科网络安全科技股份有限公司
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing SM9-related technologies, the user's private key is generated by the master private key of the key management center, and the key management center has mastered the private keys of all users in the system. Once the master private key is leaked, the private keys of all users are leaked. high security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM9 key generation method, device and system and readable storage medium
  • SM9 key generation method, device and system and readable storage medium
  • SM9 key generation method, device and system and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 3

[0110] Based on Embodiment 3, this disclosure provides a specific SM9 key generation method. When the slave key management center is a key management center, please refer to Figure 4 , Figure 4 A schematic diagram of key generation provided by an embodiment of the present disclosure, specifically including:

[0111] E() is the public key algorithm of the additive homomorphic encryption algorithm, P1 is the generator, [KS 1 ]P 1 +[KS 2 ]P 1 Denote the private key as ds, F N is a finite field containing N elements, and N is a cyclic group G 1 , G 2 , G T order, hid represents the identifier of the signature private key generation function, P 1 is the group G 1 generator; user A is the target user.

[0112] KGC 1 Main control center, α 1 is the first random number, β 1 is the second random number, ks 1 is the first sub-private key, Hash(ID||hid,N)+ks 1 As a preset variable, E(Hash(ID||hid,N)+ks 1 ) is the first ciphertext, E(β 1 ) is the first random ciphertext...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an SM9 key generation method, device and system and a readable storage medium. The SM9 key generation method comprises the following steps that according to the ID of a targetuser and a first main private key, interactive communication with a plurality of slave secret management centers is performed by utilizing a first random number and a second random number to generatea first sub private key corresponding to the format of an SM9 algorithm, wherein the slave secret management centers are secret management centers which perform interactive communication by using a third random number and a fourth random number according to a second main private key; and the first sub-private key is sent to the target user, so that the target user synthesizes a private key according to the first sub-private key and a plurality of second sub-private keys of the secret management centers. It can be known that the SM9 key generation method provided by the invention ensures the security of the first main private key, and enables the final private key to be only known by the target user. The SM9 key generation device and system applying the SM9 key generation method and the readable storage medium also have the same beneficial effects.

Description

technical field [0001] The present disclosure relates to the technical field of key generation, in particular to an SM9 key generation method, device, system and readable storage medium. Background technique [0002] In order to ensure the safe transmission of information, relevant technical personnel invented encryption and decryption technology. In the public key cryptography system, the public key used for encryption is public, and anyone can use the public key to encrypt data. The private key corresponding to the public key is used to decrypt. Therefore, how to securely and effectively manage keys is an important issue. In the existing SM9-related technologies, the user's private key is generated by the master private key of the key management center, and the key management center has mastered the private keys of all users in the system. Once the master private key is leaked, the private keys of all users are leaked. High security risk. [0003] Therefore, how to prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/00H04L9/30H04L29/06
CPCH04L9/085H04L9/0869H04L9/0861H04L9/083H04L9/0643H04L9/008H04L9/30H04L63/0442Y02D30/50
Inventor 王现方涂彬彬
Owner 中电科网络安全科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More