Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system and device for information encryption matching, processor and storage medium

An information encryption and processor technology, applied in the computer field, can solve problems such as unsatisfactory message encryption and matching requirements of partners, satisfactory performance, hash information collision, etc., and achieve fast processing speed, randomness, and high encryption strength Effect

Active Publication Date: 2021-01-15
富算科技(上海)有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there is a defect in simply adopting a cryptographic hash function: since the hash information generated by the same information is also the same, the hash information can be collided
[0007] The message encryption matching method implemented with the RSA public key cryptography algorithm has higher security than the message encryption matching method simply using the password hash function. One party generates the RSA public key and private key, and adds a random mask to the other party. The RSA public key encrypted message is blindly signed, and the other party matches the encrypted signature message after deblinding, which is more secure than the message encryption matching method that simply uses a password hash function, but it is difficult to use under high encryption strength. achieve satisfactory performance
[0008] The prior art also proposes a blind signature scheme based on the SM2 curve, which satisfies the protection of the privacy of the user and the verifiability of the signature of the signer, but cannot meet the requirements of message encryption matching between partners.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for information encryption matching, processor and storage medium
  • Method, system and device for information encryption matching, processor and storage medium
  • Method, system and device for information encryption matching, processor and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Before describing the embodiments according to the present invention in detail, it should be noted that in the following, relative terms such as first and second are only used to distinguish one entity or action from another entity or action, and do not necessarily require or Any actual such relationship or order between such entities or actions is implied. The terms "comprising", "comprising" or any other variant are intended to cover a non-exclusive inclusion whereby a process, method, article or apparatus comprising a set of elements includes not only those elements but also other elements not expressly listed elements, or elements inherent in such a process, method, article, or apparatus.

[0046] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.

[0047] see figure 1 and figure 2 As shown, in the specific embodiment of the present invention, a messa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for realizing information encryption matching processing based on an SM2 curve, and relates to an initiating end, a response end and information encryption matching modules respectively owned by the initiating end and the response end. The initiating end generates mapping information, and blinding processing is carried out to generate blinding information. The response end performs blind signature processing to generate blind signature information. The initiating end removes the blind information to obtain encrypted to-be-matched information. The response endgenerates mapping information, and encrypts the mapping information to generate encrypted to-be-matched information. The initiating end compares the encrypted to-be-matched information of the initiator with the encrypted to-be-matched information received from the response end, and judges whether the encrypted to-be-matched information is matched. The invention further relates to an information encryption matching processing system and device, a processor and a computer readable storage medium thereof. By adopting the method, the system and the device for realizing information encryption matching processing based on the SM2 curve, the processor and the computer readable storage medium thereof, randomness of encryption matching information is realized, and the advantages of high encryptionstrength and high processing speed are also realized.

Description

technical field [0001] The present invention relates to the field of computers, in particular to the field of computer security, and specifically refers to a method, system, device, processor and computer-readable storage medium for realizing information encryption matching processing based on SM2 curves. Background technique [0002] Cooperation between business organizations often requires sharing and exchanging information. Before sharing and exchanging, one hopes to know what needs to be shared and exchanged and what cannot be shared and exchanged. This creates a paradox in the general case: without sharing there is no way of knowing what cannot be shared. [0003] In order to solve this problem, cryptographic hash functions are widely used among institutions to irreversibly convert information, and then match to find out the same part, and to achieve the purpose of confidentiality because different parts cannot be reversed. [0004] However, there is a defect in simply...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3066H04L9/3257
Inventor 卞阳陈立峰
Owner 富算科技(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products