Unlock instant, AI-driven research and patent intelligence for your innovation.

SM2-based certificateless key generation method and device, electronic equipment and medium

A key generation, no certificate technology, applied in the field of information security, can solve problems such as less design methods

Active Publication Date: 2021-07-30
中电科网络安全科技股份有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are few existing certificateless key generation methods based on the design method of SM2 signature structure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2-based certificateless key generation method and device, electronic equipment and medium
  • SM2-based certificateless key generation method and device, electronic equipment and medium
  • SM2-based certificateless key generation method and device, electronic equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0111] The following will clearly and completely describe the technical solutions in the embodiments of the present disclosure with reference to the accompanying drawings in the embodiments of the present disclosure. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present disclosure.

[0112] see figure 1 , figure 1 It is a first flow chart of a method for generating a certificateless key based on SM2 according to an exemplary embodiment.

[0113] An SM2-based non-certificate key generation method involved in the present disclosure is applied to a key generation server and may include the following steps:

[0114] Step S101: Obtain the parameters of the elliptic curve applied by the SM2 algorithm.

[0115] It can be un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an SM2-based certificateless key generation method and apparatus, electronic equipment and a medium, and is applied to a key generation server. The method comprises steps of obtaining an elliptic curve parameter applied by an SM2 algorithm; generating a first random number, and generating a system public key based on the elliptic curve parameter and the first random number; acquiring identity information of the client and a part of public keys of the client; generating a public key generation parameter and a private key generation parameter based on identity information of a key generation server, an elliptic curve parameter, a system public key, identity information of the client and a part of public keys according to a key generation mode negotiated with the client; and sending the public key generation parameter and the private key generation parameter to the client, so that the client generates an identity public key based on the public key generation parameter and generates an identity private key based on the private key generation parameter. The public and private key generation method provided by the invention is simple in process, a certificate mechanism does not need to be used in subsequent application, the key generation server is prevented from acquiring the private key of the client, and the security is high.

Description

technical field [0001] The present disclosure relates to the technical field of information security, and more specifically, relates to an SM2-based non-certificate key generation method, device, electronic equipment and media. Background technique [0002] With the development of the Internet industry, cryptography application scenarios are becoming more and more diverse. During the use of cryptography, public and private keys need to be generated, such as key generation in traditional public key systems or key generation in identification cryptography systems. [0003] The key generation of the traditional public key system, the public key is a string of random numbers, it is difficult to connect with the identifiable identification of the user in the actual application, an additional certificate authentication mechanism is required, and the certificate management is relatively cumbersome. In addition, although the identity cryptography system can directly use the user's i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6218G06F21/64
Inventor 王现方张立廷
Owner 中电科网络安全科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More