GB/T 32918.2-2016: Translated English of Chinese Standard. (GBT 32918.2-2016, GB/T32918.2-2016, GBT32918.2-2016): Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 2: Digital signature algorithm
https://www.chinesestandard.net, 2018 M09 14 - 20 pages
This Part of GB/T 32918 specifies the digital signature algorithm of public key cryptographic algorithm SM2 based on elliptic curves, including digital signature generation algorithm and verification algorithm, and gives examples of digital signature and verification and the corresponding flow. This Part applies to digital signature and verification in commercial cryptographic applications, and meets the security requirements for identity authentication and data integrity and authenticity in a variety of cryptographic applications.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
00 Coordinate algorithm SM2 based base point based on elliptic bit string Calculate the elliptic Convert the data Coordinate xA cryptographic algorithm SM2 cryptographic hash algorithm Cryptography Administration curve point x1 curve’s digital signature curve’s system parameters data type digital signature algorithm Digital signature verification discrete logarithm problem distinguishing identifier E(Fq elliptic curve point Elliptic curve’s digital Elliptic curve’s system ENTLA ǁ IDA example of digital given in GB/T H256 ENTLA ǁ hash algorithm value hash value Hv 𝑀 Information security technology integer according key cryptographic algorithm key exchange protocol method given 𝑃 point G Public key cryptographic public key cryptosystem Public key encryption random number relevant values Set 𝑀 signature generation algorithm signature generation process signature of message signature verification algorithm signer SM3 cryptographic hash User A's verification algorithm flow verification fails xA ǁ xG ǁ yG yG ǁ xA ǁ b ǁ ǁ IDA ǁ ǁ xG ǁ yG ǁ