GB/T 32918.2-2016 Translated English of Chinese Standard. (GBT 32918.2-2016, GB/T32918.2-2016, GBT32918.2-2016): Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 2: Digital signature algorithmhttps://www.chinesestandard.net, 14 sept. 2018 - 20 pages This Part of GB/T 32918 specifies the digital signature algorithm of public key cryptographic algorithm SM2 based on elliptic curves, including digital signature generation algorithm and verification algorithm, and gives examples of digital signature and verification and the corresponding flow. This Part applies to digital signature and verification in commercial cryptographic applications, and meets the security requirements for identity authentication and data integrity and authenticity in a variety of cryptographic applications. |
Expressions et termes fréquents
00 Coordinate algorithm SM2 based base point based on elliptic bit string Calculate the elliptic Convert the data Coordinate xG Coordinate y'0 cryptographic algorithm SM2 cryptographic hash algorithm Cryptography Administration curve point x1 curve’s digital signature curve’s system parameters data type digital signature algorithm Digital signature verification discrete logarithm problem distinguishing identifier E(Fq elliptic curve point Elliptic curve’s digital Elliptic curve’s system ENTLA ǁ IDA example of digital given in GB/T H256 ENTLA ǁ hash algorithm value hash value Hv 𝑀 Information security technology integer according key cryptographic algorithm key exchange protocol method given 𝑃 point G Public key cryptographic public key cryptosystem random number relevant values Set 𝑀 signature and verification signature generation algorithm signature generation process signature of message signature verification algorithm signer SM3 cryptographic hash User A's verification algorithm flow verification fails xA ǁ xG ǁ yG yG ǁ xA ǁ b ǁ ǁ IDA ǁ ǁ xG ǁ