Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Zero-knowledge proving method and system based on SM2 algorithm

A zero-knowledge proof and algorithm technology, applied in the field of information security, to achieve the effect of smooth execution, reduced data transmission, and small amount of calculation

Inactive Publication Date: 2022-02-18
工业信息安全(四川)创新中心有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention aims to provide a zero-knowledge proof method and system based on the SM2 algorithm to solve the problem of existing zero-knowledge proof schemes when the above-mentioned user proves that he knows the private key corresponding to a certain public key and does not want to disclose the private key. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zero-knowledge proving method and system based on SM2 algorithm
  • Zero-knowledge proving method and system based on SM2 algorithm
  • Zero-knowledge proving method and system based on SM2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] First illustrate the sign, abbreviation and symbol used in the present invention:

[0058] A : Prover User A 。

[0059] B : verifier user B 。

[0060] a , b : finite field F q elements in , which define the finite field F q an elliptic curve on E .

[0061] d A : User A's private key.

[0062] E ( F q ): finite field F q upper elliptic curve E All rational points of (including points at infinity or zero O ) set consisting of.

[0063] F q :Include q A finite field of elements.

[0064] G : elliptic curve E A base point of whose order is a prime number.

[0065] H (): Cryptographic hash function, which can be selected as the SM3 algorithm. For details of the SM3 algorithm, refer to GB / T 32905 "Information Security Technology SM3 Cryptographic Hash Algorithm".

[0066] ID A : The distinguishable identifier of user A.

[0067] mod n :mold n operation. For example, 23 mod 7 = 2.

[0068] n : G point order ( n yes# E ( F q ) prime ...

Embodiment 2

[0138] In order to realize the zero-knowledge proof method based on the SM2 algorithm of embodiment 1, such as Figure 4 As shown, this embodiment proposes a zero-knowledge proof system based on the SM2 algorithm, including: a connected zero-knowledge proof information generation subsystem and a zero-knowledge proof information verification subsystem;

[0139] The zero-knowledge proof information generation subsystem is deployed on the prover, and is used for the prover user A to generate and send SM2 zero-knowledge proof information; specifically, the zero-knowledge proof information generation subsystem includes a first control scheduling module and a communication with the second A first hash module, a first SM2 module, a first transmission data codec module and a random number generator module connected to a control scheduling module;

[0140] The functions of each module in the zero-knowledge proof information generating subsystem are as follows:

[0141] Random Number G...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a zero-knowledge proving method and system based on an SM2 algorithm. The method comprises the following steps: step 100, a proving party user A generates SM2 zero-knowledge proving information; step 200, the proving party user A sends SM2 zero-knowledge proving information; and step 300, a verification party user B verifies the SM2 zero-knowledge proving information. According to the method, the problem existing in the existing zero-knowledge proving scheme when the user proving that the user knows the private key corresponding to a certain public key and does not hope to leak the private key can be solved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a zero-knowledge proof method and system based on the SM2 algorithm. Background technique [0002] SM2 elliptic curve cryptography (elliptic curve cryptography, ECC) is the standard of public key cryptography in my country, see GB / T 32918 (all parts) "Information Security Technology SM2 Elliptic Curve Public Key Cryptography Algorithm", the main content of SM2 algorithm includes 3 parts: digital signature algorithm, key exchange protocol, public key encryption algorithm. Since ECC has much smaller private key bit length and system parameters than RSA under the same security strength, this makes ECC more suitable than RSA for implementation in devices with severely limited resources, such as industrial control equipment with low power consumption requirements, mobile communications, etc. devices, wireless communication devices, and smart cards, etc. At presen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/0869H04L9/3066H04L9/3218
Inventor 罗影张文科许莹莹冷昌琦
Owner 工业信息安全(四川)创新中心有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products