Unlock instant, AI-driven research and patent intelligence for your innovation.

A certificateless signature method, device, equipment and medium based on sm2 algorithm

A technology without certificates and algorithms, applied in the field of information security, can solve problems such as complex calculations and low efficiency, and achieve the effect of high efficiency and guaranteed security

Active Publication Date: 2021-11-09
BEIJING HAITAI FANGYUAN HIGH TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a certificateless signature method, device, equipment and medium based on the SM2 algorithm, which is used to solve the problems of complex calculation and low efficiency in existing certificateless signature schemes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A certificateless signature method, device, equipment and medium based on sm2 algorithm
  • A certificateless signature method, device, equipment and medium based on sm2 algorithm
  • A certificateless signature method, device, equipment and medium based on sm2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to enable ordinary persons in the art to better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings.

[0064] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that such descriptions are interchangeable under appropriate circumstances such that the embodiments of the invention can be practiced in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a non-certificate signature method, device, equipment and medium based on an SM2 algorithm, and relates to the technical field of information security. In this method, the user generates and sends the user public key X id To the key generation center, receiving the key generation center according to the user public key X id The determined user's partial private key D id , based on the user's partial private key D id and the user secret value x randomly generated by the user id Generate user private key SK id , based on the user private key SK id Generate a signed value S. Based on the SM2 cryptographic algorithm, the signing process is completed by the user alone, without the participation of the verifier, without the use of bilinear pairing, and certificateless signature is realized, which is efficient and secure.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an SM2-based certificateless signature method, device, equipment and medium. Background technique [0002] The certificateless public key cryptography (CL-PKC) born in 2003 overcomes the private key escrow problem in IBC (identity-based public key cryptography). Compared with traditional public key cryptography, CL-PKC, like IBC, does not require a certificate. At the same time, CL-PKC eliminates the private key escrow problem of IBC. In the CL-PKC cryptographic system, the key generation center KGC generates a partial private key for the user. The user selects a secret value and combines it with the partial private key to generate the user private key. The user private key is jointly generated by the KGC and the user. KGC does not know the user's full private key, thus avoiding key escrow issues. [0003] In recent years, CL-PKC has been one of the promine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0861H04L9/3236H04L9/3247
Inventor 王学进刘雪梅蒋红宇
Owner BEIJING HAITAI FANGYUAN HIGH TECH