Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

PKE method and system based on SM2 algorithm

A component and key technology, applied in the field of information security

Active Publication Date: 2017-07-18
北京百旺信安科技有限公司 +1
View PDF7 Cites 57 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the application requirement of entrusting a large number of private key components for key splitting and joint computing, the present invention proposes an identification-based private key component escrow method, and thus constructs a corresponding key component escrow system (Partialkey escrow, PKE for short), to solve the problem of user private key component custody in the scenario of a large number of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PKE method and system based on SM2 algorithm
  • PKE method and system based on SM2 algorithm
  • PKE method and system based on SM2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0059] The present invention proposes a key component escrow method and system based on the SM2 algorithm. The specific implementation of the present invention will be described in detail below with reference to the accompanying drawings.

[0060] The key component escrow method and system based on the SM2 algorithm of the present invention rely on the national secret SM2 public key cryptographic algorithm and the SM3 hash algorithm, and the elliptic curve para...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a partial key escrow (PKE) method and system based on a public key cryptographic algorithm SM2, and belongs to the field of information security. N (N is not less than 1) different PKE systems form one key escrow network. An SM2 private key of a user is divided into N+1 partial keys by utilizing key partition storage and multiparty combined calculation modes; the user and the N different PKE systems perform scatter storage; and the user and the N different PKE systems are combined to complete a correlation calculation when the private key needs to be used. At user key generation and use stages, the PKE system generates user partial private keys by utilizing a labeling mapping algorithm, but does not practically save the user partial private keys; therefore, the construction scale of the system can be largely reduced, investment costs of the system are reduced, and operation efficiency and service level of the system are improved.

Description

technical field [0001] The invention relates to a key component trusteeship method and system based on an SM2 public key cryptographic algorithm and a key split storage mechanism, and belongs to the field of information security. Background technique [0002] In the Internet and cloud computing environment, a large number of network-related applications have emerged, such as online banking, online payment, online shopping and Internet medical care, etc., which require online user identity authentication, online operation confirmation and user privacy protection to ensure that network applications security. The best way to solve this security requirement is to use public key cryptography to realize digital signature and public key encryption. When using public key cryptography, it is critical to keep the private key used secure. Under normal circumstances, in order to ensure the safe storage and use of the private key, the private key used for signing and decryption is requ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0866H04L9/0894H04L9/3255
Inventor 熊荣华其他发明人请求不公开姓名
Owner 北京百旺信安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products