SM2-based data processing method, system and electronic device

A data processing and equipment technology, applied in the field of information security, can solve the problems of large data processing volume and low data processing efficiency

Active Publication Date: 2021-08-31
北京信安世纪科技股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, under normal circumstances, the system will require the authentication and confidentiality of information at the same time. The traditional method is to use the method of signing first and then encrypting. The required cost is the sum of signing and encryption. lower

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2-based data processing method, system and electronic device
  • SM2-based data processing method, system and electronic device
  • SM2-based data processing method, system and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Abbreviations and key terms involved in this application:

[0020] f p : a prime domain containing p elements;

[0021] E(F p ): F p The set of all rational points (including the point O at infinity) on the upper elliptic curve E;

[0022] (p , a , b , G , n , h): the curve parameters of the SM2 algorithm, where p is a prime number with a length of 256 bits;

[0023] a and b are F p elements in , used to define F p An elliptic curve E on

[0024] G is the base point, expressed by coordinates G=(x G ,y G );

[0025] n is the order of G; h is the cofactor;

[0026] h v ( ): a cryptographic hash function with a message digest length of v bits, which uses SM3;

[0027] ID A : User A's identity;

[0028] ENTL A :ID A length of ENTL A The length is 2 bytes;

[0029] mod n: modulo n operation;

[0030] O: A special point on the elliptic curve, called the infinity point or zero point, is the identity element of the additive group of elliptic curves;

[0031]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses an SM2-based data processing method, system, and electronic device, wherein the method is applicable to the first device corresponding to the first user, including: acquiring the message to be signed encrypted and the first signature information corresponding to the message to be signed encrypted and the second signature information; based on the message to be signed and the first signature information, determine the corresponding first target length information with the second signature information; obtain the first public key information corresponding to the second user and the target random value; use the first A target length information, the first public key information, and the target random value to determine the first information; according to the first information, the first signature information, and the second signature information, encrypt the message to be signcrypted to obtain the first initial signcryption result ; Obtain the first elliptic curve point information corresponding to the target random value; determine the first target signcryption result by using the first initial signcryption result and the first elliptic curve point information. The technical solutions provided by various embodiments of the present application can improve the data processing efficiency in the signcryption process.

Description

technical field [0001] The present application belongs to the field of information security, and in particular relates to an SM2-based data processing method, system and electronic equipment. Background technique [0002] SM2 is an elliptic curve public key cryptographic algorithm. Compared with the RSA algorithm, it has the advantages of high security and high computing efficiency. It has broad application prospects, including SM2 encryption algorithm and SM2 signature algorithm. [0003] However, under normal circumstances, the system will require the authentication and confidentiality of information at the same time. The traditional method is to use the method of signing first and then encrypting. The required cost is the sum of signing and encryption. lower. Contents of the invention [0004] The embodiment of the present application provides an implementation solution different from the prior art, so as to improve the data processing efficiency of the signcryption pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/32
CPCH04L9/3066H04L9/3252
Inventor 张宇张庆勇
Owner 北京信安世纪科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products