Check patentability & draft patents in minutes with Patsnap Eureka AI!

SM2 signature method based on mobile KEY key protection technology

A key protection and technology technology, applied in the field of information security, can solve the problems of low signature efficiency, low computing cost, high computing cost, etc., and achieve the effect of improving signature efficiency and saving computing cost

Pending Publication Date: 2022-01-11
XIAN UNIV OF POSTS & TELECOMM
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a SM2 signature method based on the mobile KEY key protection technology, which adopts the product secret division technology, has lower calculation cost, improves signature efficiency, can be applied to mobile devices with limited resources, and overcomes the existing There is a problem that the SM2 digital signature method based on two-party collaboration cannot be applied to resource-constrained mobile devices due to high computational cost and low signature efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2 signature method based on mobile KEY key protection technology
  • SM2 signature method based on mobile KEY key protection technology
  • SM2 signature method based on mobile KEY key protection technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the specific implementation modes of the present invention will be described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Example. Based on the embodiments of the present invention, all other embodiments obtained by ordinary persons in the art without creative efforts shall fall within the protection scope of the present invention.

[0049] In the following description, a lot of specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, and those skilled in the art can do it without departing from the meaning of the present invention. By analogy, the present invention is therefore not limited ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, in particular to an SM2 signature method based on a mobile KEY key protection technology. The problem that an existing SM2 digital signature method based on cooperation of two parties cannot be applied to mobile equipment with limited resources due to high calculation cost and low signature efficiency is solved. The method comprises the processes of system initialization, secret key generation, cooperative signature and complete signature output, an SM2 signature private key is divided into two parts which are kept by a first communication party and a second communication party respectively, and a signature public key and a complete SM2 signature can be generated only by cooperative calculation of the two communication parties in the secret key generation stage and the cooperative signature stage. Any party cannot obtain a complete private key to independently output a complete signature. An attacker can be prevented from exporting a complete private key, and the security of the private key is high. Meanwhile, a product secret segmentation technology is adopted in the collaborative signature process, so that the calculation cost is greatly saved, the signature efficiency is improved, and the method can be applied to mobile equipment with limited resources.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an SM2 signature method based on mobile KEY key protection technology. Background technique [0002] The SM2 digital signature algorithm is an important part of an elliptic curve cryptographic algorithm standard. It is used to realize digital signatures, ensure the authenticity of identities, the integrity of data, and the non-repudiation of behaviors. It is the core technology and foundation of cyberspace security. The support has now become the ISO / IEC international standard, and has been widely used in the field of domestic commercial secret applications for many years. [0003] In recent years, with the improvement of the mobile Internet and the rapid popularization of smart terminals, traditional Internet applications continue to extend and develop into the wireless field. Mobile applications are changing people's living habits in an all-round way. Many applicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/64G06F7/58
CPCG06F21/602G06F21/64G06F7/588
Inventor 侯红霞
Owner XIAN UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More