Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret SM9 algorithm private key distribution method, user terminal and key generation center

A key generation center and user terminal technology, applied in the field of information security, can solve the problems of cryptographic system failure, unpublished private key security application distribution process, etc., and achieve the effect of ensuring integrity and security.

Active Publication Date: 2021-10-29
NARI INFORMATION & COMM TECH +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the release of the SM9 algorithm in 2016, only the specific calculation steps of the algorithm itself have been published, including the key generation center (KGC) parameter generation method, encryption algorithm, signature algorithm, key exchange algorithm, and key encapsulation algorithm. Before using the SM9 algorithm, you must apply to KGC for your own signature private key or encryption private key. The algorithm specification does not publish a set of general private key security application distribution procedures
The importance of private key distribution security to asymmetric algorithms is self-evident, and the leakage of the private key during transmission will lead to the complete failure of the cryptographic system
The present invention proposes a set of SM9 algorithm online private key distribution protocol to solve the problem of security authentication and secure transmission of private key when users apply for private key from KGC

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret SM9 algorithm private key distribution method, user terminal and key generation center
  • Secret SM9 algorithm private key distribution method, user terminal and key generation center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0093] It is known in the prior art that the user's private key is generated by the key generation center KGC, and the private key is sent to the user online by the KGC. Since the private key is distributed through an untrusted public network, in order to avoid leakage of the private key, the present invention transmits the private key during the transmission process. Based on the elliptic curve discrete logarithm operation, the intermediate private key parameters are calculated using the private key factor to ensure that only the user can restore the private key from the private key parameters, and both parties have added the necessary integrity verification.

[0094] Since the method of generating the user signature private key and the encrypted private key of the SM9 algorithm is not exactly the same, the private key distribution process also needs to be treated differently. The method steps described in the present invention propose their own calculation steps for the two to...

Embodiment 2

[0148] Based on the same inventive concept as the method in Embodiment 1, a user terminal for distributing the private key of the national secret SM9 algorithm of the present invention includes:

[0149] The user registration module is used to register with the key generation center KGC and set a user password to generate corresponding user parameters;

[0150] The private key application module is used to calculate the verification parameters for private key application based on random numbers and user parameters, and send the verification parameters to KGC;

[0151] The private key receiving module is used to receive the private key parameters sent by KGC;

[0152] The private key calculation module is used to verify the private key parameters, and if the verification is correct, the private key is calculated based on the private key parameters.

[0153] The present invention also provides a key generation center for the private key distribution of the national secret SM9 a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret SM9 algorithm private key distribution method. The method comprises the following steps that 1, a user registers in a KGC and sets a user password; 2, a user generates a random number and calculates a private key application verification parameter; 3, the user sends a verification parameter to the KGC; 4, the KGC verifies user parameters; 5, the KGC sends a user private key parameter; 6, KGC parameters are verified by a user; and 7, the user exports a private key. According to the method, the construction and transformation cost of the key generation center KGC is low, online private key distribution of massive terminals of the Internet of Things is supported, and the safety and availability of an Internet of Things system are effectively improved.

Description

technical field [0001] The invention belongs to the technical field of information security, and specifically relates to a method for distributing a private key of the national secret SM9 algorithm, and also relates to a user terminal and a key generation center for distributing the private key of the national secret SM9 algorithm. Background technique [0002] With the advancement of the Internet of Things construction in Fanzai, the number of Internet of Things terminal devices is increasing day by day, and the number of terminals has shown an exponential growth. In order to ensure the confidentiality and integrity of the data transmission process of the Internet of Things, asymmetric encryption algorithms are commonly used for mutual identity authentication and work key negotiation between terminals and stations, but traditional PKI systems require cumbersome public key certificate issuance management and The certificate exchange operation is very bloated and inefficient ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08
CPCH04L9/0825H04L9/3066
Inventor 郑卫波黄益彬郭子昕纪元金建龙谢华菁张鸿鹏邓进金倩倩王正琦张旭东
Owner NARI INFORMATION & COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products