Secret key application method based on SM9 algorithm

A key and algorithm technology, applied in computing, computer security devices, instruments, etc., can solve the problems of SM9 algorithm key update, revocation difficulty, user ID cannot be changed, user is not the only owner of the private key, etc.

Active Publication Date: 2021-04-23
FUJIAN NORCA TECH
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, the user's private key is generated by the key generation center based on the user ID, which will result in the user not being the sole owner of the private key; on the other hand, since the user's key is generated based on the user ID, the user ID cannot be changed generally, resulting in Algorithm key update and revocation are difficult and need to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key application method based on SM9 algorithm
  • Secret key application method based on SM9 algorithm
  • Secret key application method based on SM9 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Such as figure 1 As shown, the present invention provides a kind of key application method based on SM9 algorithm, comprises the steps:

[0017] Step S01, according to the key generation rules of the SM9 algorithm, the static key generation center SKGC generates the user's static key based on the user ID, and the static key includes an encryption key pair and a signature key pair;

[0018] Step S02, according to the key generation rules of the SM9 algorithm, the dynamic key management center DKGC constructs the user's dynamic identification through the user identification and the given dynamic variation, and generates the user's dynamic key based on the user's dynamic identification. The dynamic key Also contains encryption key pair and signing key pair;

[0019] Step S03, under the joint action of the static key and the dynamic key, the functions of encryption, decryption, signature and signature verification of the SM9 algorithm are completed.

[0020] In the step S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret key application method based on an SM9 algorithm, and the method comprises the steps that a static secret key management center generates a static secret key of a user based on a user identification according to a secret key generation rule of the SM9 algorithm, and a dynamic secret key management center constructs a dynamic identification of the user through the user identification and a given dynamic change amount, and a dynamic key of the user based on the user dynamic identifier is generated; the user generates a static public key based on the static identifier of the communication opposite side, generates a dynamic public key based on the dynamic identifier of the communication opposite side, and realizes encryption or signature verification operation based on the static public key and the dynamic public key; a user acquires the static private key from the static secret key management center, acquires the dynamic private key from the dynamic secret key management center, and realizes decryption or signature operation based on the static private key and the dynamic private key. According to the key application method, an SM9 key security management mechanism based on SKGC and DKGC is provided, and the problems of key escrow, update and revocation of an SM9 algorithm can be solved.

Description

technical field [0001] The invention belongs to the technical field of key application, and in particular relates to an application method for generating a key based on an SM9 algorithm for encryption, decryption, signature, and verification. Background technique [0002] As an Identity-Based Cryptograph (IBC), SM9 has some shortcomings in key management compared with PKI cryptosystem. On the one hand, the user's private key is generated by the key generation center based on the user ID, which will result in the user not being the sole owner of the private key; on the other hand, since the user's key is generated based on the user ID, the user ID cannot be changed generally, resulting in Algorithm key update and revocation are difficult and need to be improved. Contents of the invention [0003] The purpose of the present invention is to provide a key application method based on the SM9 algorithm, provide a SM9 key security management mechanism based on SKGC and DKGC, whi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/64
CPCG06F21/602G06F21/64
Inventor 陈明志傅明建翁才杰许春耀谢加良杨小权饶庆裕张瑞李栋赵明烽程淏
Owner FUJIAN NORCA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products