Supercharge Your Innovation With Domain-Expert AI Agents!

Signature and decryption method and system based on SM2 algorithm

An algorithm and key technology, applied in transmission systems, digital transmission systems, and key distribution, can solve the problems of increased computational overhead, low efficiency, and low security.

Active Publication Date: 2021-12-07
长春吉大正元信息安全技术有限公司 +1
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing threshold algorithm has certain defects. The existing threshold algorithm is actually a two-party cooperative SM2 signature algorithm. Increase, the overhead of the amount of calculation will also increase, and the efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature and decryption method and system based on SM2 algorithm
  • Signature and decryption method and system based on SM2 algorithm
  • Signature and decryption method and system based on SM2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] Such as figure 1 as shown, figure 1 It is a schematic flowchart of a signature method based on the SM2 algorithm provided by the embodiment of the present invention. The embodiment of the present invention provides a signature method based on the SM2 algorithm, which is applicable to multiple data contributors (participants) providing joint data usage In the field of authorization features, the method can be implemented by a signature system based on the SM2 algorithm.

[0039] In this embodiment, the server includes m participants; the client includes n participants. Both m and n are positive integers; among them, n≤t, m≥t+1, m+n≥2t+1; t is the threshold value. In this embodiment, the devices involved in the signature and decryption process include a server and at least one client. In this embodiment, a client and a server are used as an example to illustrate, where the server includes m participants, and the client includes n Participants, limit the threshold value...

Embodiment 3

[0080] like image 3 as shown, image 3 It is a schematic flowchart of a decryption method based on the SM2 algorithm provided by the embodiment of the present invention. The embodiment of the present invention provides a decryption method based on the SM2 algorithm, which is applicable to multiple data contributors (participants) providing joint data usage In the field of authorization characteristics, the method can be performed by a decryption system based on the SM2 algorithm. In this embodiment, the server and the client are not less than 2t+1 participants to perform the relevant process, which specifically includes the following steps:

[0081] S301. According to the first key component d of m participants, the server i synthesize one or more second key components d s .

[0082] The server may send multiple first key components d i synthesize a second key component d s , then the server synthesizes at least one second key component d according to the first key compo...

Embodiment 4

[0115] continue to refer Figure 5 , Figure 5 It is also a schematic structural diagram of a decryption system based on the SM2 algorithm provided by the embodiment of the present invention. This embodiment provides a decryption system based on the SM2 algorithm, and the system includes:

[0116] Client 51, the client includes n participants; each participant generates the first secret key component d i ; The client is used to get d i C 1 ; and get d c C 1 ;d c is the first secret key component d in the client i The synthetic key component of ;

[0117] Server 52, the server includes m participants; each participant generates a first key component; the server synthesizes one or more second key components d according to the first key components of m participants s ; and get d s C 1 ; and d s C 1 with d c C 1 Add up to get dC 1 ; The server is also used to 1 Obtain the plaintext M corresponding to the ciphertext C, and verify the plaintext M; both m and n are po...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a signature and decryption method and system based on an SM2 algorithm, and the method comprises the steps: enabling all participants to execute Joint-RSS to share a private key d, and enabling the participants to generate a first secret key component di; executing Inv-SS according to the first secret key component di to obtain a first secret key sharing share d'i; synthesizing at least one second secret key sharing share d's according to the first sharing share d'i by the server; executing t-order SS sharing of the random secret k by the server, wherein the secret sharing share is ki; calculating dInvK = d'i ki according to Mu-SS; the server generating a random number kTmp, and obtaining a first signature result r and a second signature result share ss according to the random secret k, the dInvK, the random number kTmp and the second secret key sharing share d's; the client obtaining a second signature result share sc according to the first signature result r; and the server obtaining a second signature result s according to the second signature result share sc and the second signature result share ss. According to the technical scheme provided by the invention, a signature scheme with low operand and relatively high security can be provided.

Description

technical field [0001] The invention relates to the field of display technology, in particular to a signature and decryption method and system based on the SM2 algorithm. Background technique [0002] In terms of engineering, the threshold encryption scheme is relatively mature. Take the open source reference implementation based on the classic paper "Simple and EfficientThreshold Cryptosystem from the Gap Diffie-Hellman Group" as an example. On a personal computer, a single data block is segmented once. Both aggregation and decryption take microseconds, which can already meet the commercial performance requirements of most businesses. [0003] In terms of application, in addition to the previously described multi-party authorized data decryption, the threshold encryption scheme is widely used in anonymous electronic voting, data proxy services, data outsourcing computing and other fields that need to provide joint data usage authorization features for multiple data contribu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/085H04L9/3247
Inventor 邹跃鹏高旭张宇韬刘立生
Owner 长春吉大正元信息安全技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More