Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implicit certificate key generation method based on sm2 digital signature

An implicit certificate and digital signature technology, applied in the field of information security, can solve problems such as identity information input errors, receiver decryption failure, and calculation speed to accelerate user public key generation, etc.

Active Publication Date: 2021-07-06
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the problem with IBC itself is that although the identity is a meaningful string, if the identity information is entered incorrectly during encryption, it may also cause the receiver to fail to decrypt
However, the ECQV implicit certificate protocol has a certificate misbinding attack, and in terms of computing speed, it cannot accelerate the generation of user public keys in the ECQV implicit certificate protocol by precomputing and storing data operations.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implicit certificate key generation method based on sm2 digital signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] refer to figure 1 , the implementation steps of the present invention are as follows:

[0035] Step 1, system parameter initialization.

[0036] The system parameters of this example are set according to the domestic cryptographic algorithm SM2 standard recognized by the State Cryptography Administration, and the settings are as follows:

[0037] 1.1) Let F q is a finite field of order q, where q is an odd prime number or a power of 2, when q is an odd prime number p, p>2 is required 191 ; when q is a power of 2 m When , require m>192 and be a prime number;

[0038] 1.2) Select the elliptic curve equation E as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implicit certificate key generation method based on SM2 digital signature, which mainly solves the problem that the user identity cannot be corresponding to the user public key in the public key cryptosystem in the prior art. The scheme is: set system parameters and initialize according to the standard cryptographic algorithm SM2; the certificate authority CA generates a key pair and uses the public key P CA Send to the user usr who applies for the certificate; the user who applies for the certificate generates a temporary key pair and identifies his identity ID A and the temporary public key X to the certificate authority CA; the CA generates the implicit certificate cert and signature s, and sends the cert and s to the user who applies for the certificate; the user generates the complete public key U and signs the complete public key U and s to verify and obtain a complete public-private key pair (u, U). The invention conforms to the national secret SM2 signature algorithm standard, has high operation efficiency, short bandwidth overhead, reduces the risk of a middleman replacing a public key, and can be used in an Internet of Things environment with limited resources.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an implicit certificate key generation method, which can be used in an Internet of Things environment with limited resources, unifies the relationship between user identity and user public key, and realizes public key authentication. Background technique [0002] In the public key cryptography system, a user has two keys, public key and private key. Among them, the public key is open to anyone. Anyone who obtains the public key can use the public key to encrypt the message. The encrypted ciphertext can then be sent to the recipient through an open channel. Only the recipient who has the private key corresponding to the public key can correctly decrypt the ciphertext and recover the plaintext information. Typical public key encryption systems include RSA system, ELGamal system, and Gramer-Shoup system with high security. [0003] A key problem with this ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0861H04L9/0869H04L9/3066H04L9/3236H04L9/3239H04L9/3242H04L9/3247H04L9/3249H04L9/3263H04L9/3268
Inventor 姜奇刘强赵贵川马建峰马卓张俊伟杨超马鑫迪李兴华杨力
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products