Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-party collaborative encryption and decryption method and device based on SM2 algorithm, system and medium

An encryption and decryption algorithm technology, applied in the field of data encryption and decryption, can solve the problem of low security of encrypted and decrypted data

Pending Publication Date: 2020-12-01
上海市数字证书认证中心有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a multi-party cooperative encryption and decryption method based on the SM2 algorithm, a device, a system, and a medium to solve the problem of low security of data encryption and decryption between multiple participants in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party collaborative encryption and decryption method and device based on SM2 algorithm, system and medium
  • Multi-party collaborative encryption and decryption method and device based on SM2 algorithm, system and medium
  • Multi-party collaborative encryption and decryption method and device based on SM2 algorithm, system and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the invention, not to limit the invention.

[0086] Elliptic curve cryptography (ECC, Elliptic curve cryptography) is a public key system based on an elliptic curve algorithm defined on a finite field. The SM2 algorithm is a specific algorithm of the ECC cryptosystem. An elliptic curve public key cryptography algorithm is specified in the national standard "GB / T 32918 Information Security Technology SM2 Elliptic Curve Public Key Cryptography Algorithm", and the generation algorithm of encryption and decryption based on SM2 conforms to the provisions of this standard.

[0087] The following symbols are specified, and the following symbols also refer to the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of data encryption and decryption, in particular to a multi-party collaborative encryption and decryption method and device based on an SM2 algorithm, a system and a medium. The method comprises the following steps: S1, group members register to a trusted center to form a group; S2, the group members and the trusted center respectively generate privatekey components, the trusted center sequentially performs polling communication with the group members to generate a common public key based on a security computing protocol of an SM2 algorithm, and the public key is used for a message sender to perform data encryption; and S3, the trusted center receives the encrypted data, carries out polling communication with the group members in sequence, andcarries out cooperative decryption on the encrypted data by adopting a private key component based on an SM2 algorithm and the group members to obtain decrypted data. In the encryption and decryptionprocess, each group member in the group needs to participate in the effective decryption, the fair participation of each group member is ensured, and through the registration verification of the trusted center, the fake name replacement of participants is effectively avoided, and the sharing of decrypted information among the group members is ensured.

Description

technical field [0001] The present invention relates to the technical field of data encryption and decryption, and more specifically, relates to a multi-party cooperative encryption and decryption method, device, system, and medium based on the SM2 algorithm. Background technique [0002] With the development of cryptography and computing technology, the commonly used 1024-bit RSA algorithm is facing serious security threats. The State Cryptography Administration released the SM2 elliptic curve public key cryptography algorithm on December 17, 2010. Compared with the RSA algorithm, SM2 has more advantages in terms of security and performance. [0003] In the public key cryptosystem, ensuring the security of the private key is a very important issue. The user's private key usually needs to be safely stored and used in a special hardware security module (HSM, Hardware Security Module), and the private key cannot be derived from the cryptographic hardware. Common HSMs includ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L9/08
CPCH04L9/3066H04L9/3236H04L9/0833
Inventor 崔久强孙欣冯晔王玉林
Owner 上海市数字证书认证中心有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More