SM2-based data processing method and system and electronic equipment

A data processing and equipment technology, applied in the field of information security, can solve the problems of low data processing efficiency and large data processing volume

Active Publication Date: 2021-06-18
北京信安世纪科技股份有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, under normal circumstances, the system will require the authentication and confidentiality of information at the same time. The traditional method is to use the method of signing first and then encrypting. The required cost is the sum of signing and encryption. lower

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2-based data processing method and system and electronic equipment
  • SM2-based data processing method and system and electronic equipment
  • SM2-based data processing method and system and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Abbreviations and key terms involved in this application:

[0020] F p : a prime field containing p elements;

[0021] E(F p ): F p The set of all rational points (including the point O at infinity) on the elliptic curve E;

[0022] (p ,a ,b ,G ,n ,h): the curve parameters of the SM2 algorithm, where p is a prime number with a length of 256 bits;

[0023] a and b are F p elements in which define F p an elliptic curve E on

[0024] G is the base point, and the coordinates are expressed as G=(x G ,y G );

[0025] n is the order of G; h is the cofactor;

[0026] H v ( ): A cryptographic hash function with a message digest length of v bits, which uses SM3;

[0027] ID A : User A's identity;

[0028] ENTL A :ID A length, ENTL A The length is 2 bytes;

[0029] mod n: modulo n operation;

[0030] O: A special point on the elliptic curve, called the infinity point or the zero point, is the identity element of the additive group of the elliptic curve;

[0031...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SM2-based data processing method and system and electronic device. The method is suitable for first equipment corresponding to a first user and comprises the steps that a to-be-signcrypted message and first signature information and second signature information corresponding to the to-be-signcrypted message are obtained; determining corresponding first target length information based on the to-be-signcrypted message, the first signature information and the second signature information; acquiring first public key information corresponding to a second user and a target random value; determining first information by using the first target length information, the first public key information and the target random value; encrypting the to-be-signcrypted message according to the first information, the first signature information and the second signature information to obtain a first initial signcryption result; acquiring first elliptic curve point information corresponding to the target random value; and determining a first target signcryption result by using the first initial signcryption result and the first elliptic curve point information. According to the technical scheme provided by the embodiment of the invention, the data processing efficiency in the signcryption process can be improved.

Description

technical field [0001] The present application belongs to the field of information security, and in particular relates to a data processing method, system and electronic device based on SM2. Background technique [0002] SM2 is an elliptic curve public key cryptographic algorithm. Compared with the RSA algorithm, it has the advantages of high security and high computational efficiency, and has broad application prospects, including SM2 encryption algorithm and SM2 signature algorithm. [0003] However, under normal circumstances, the system will require both the authentication and confidentiality of the information. The traditional method is to use the method of first signing and then encrypting. The required cost is the sum of the signature and encryption. lower. SUMMARY OF THE INVENTION [0004] The embodiment of the present application provides an implementation solution different from the prior art, so as to improve the data processing efficiency of the signcryption p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32
CPCH04L9/3066H04L9/3252
Inventor 张宇张庆勇
Owner 北京信安世纪科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products