首页 | 本学科首页   官方微博 | 高级检索  
     检索      

受控签名在泛在电力物联网中的应用研究
引用本文:刘书勇,李时英,李向锋,卢 艳,孔令达,马慧远.受控签名在泛在电力物联网中的应用研究[J].教育技术导刊,2009,19(9):246-250.
作者姓名:刘书勇  李时英  李向锋  卢 艳  孔令达  马慧远
作者单位:1. 中国电力科学研究院有限公司,北京 100192,2. 北京联合大学 智慧城市学院,北京 100101, 3. 北京数字认证股份有限公司,北京 100080,4. 国网北京市电力公司,北京 100031
基金项目:国家电网公司科技项目(52020118007D)
摘    要:为改善用户体验,保证互联网应用场景安全,通过应用移动终端密码算法、密码协议和密码产品实现移动端数字签名,基于安全多方计算,通过一系列交互协议,建立多方协作方式实现密码支撑。结合当前身份认证和通信内容保护的实际需求,依据国家密码管理局发布的 SM2 椭圆曲线算法实现原理,设计 SM2 受控签名方案。在该方案中,可通过多方产生并保管一部分密钥分量,协作完成数字签名密码操作,因此可保证电力泛在物联网应用场景安全,实现移动端数字签名,提升系统安全性。

关 键 词:泛在电力物联网  受控签名  协同密码运算  密码技术  安全多方计算  
收稿时间:2019-12-31

Application of Controlled Signature Algorithm in Ubiquitous Power Internet of Things
LIU Shu-yong,LI Shi-ying,LI Xiang-feng,LU Yan,KONG Ling-da,MA Hui-yuan.Application of Controlled Signature Algorithm in Ubiquitous Power Internet of Things[J].Introduction of Educational Technology,2009,19(9):246-250.
Authors:LIU Shu-yong  LI Shi-ying  LI Xiang-feng  LU Yan  KONG Ling-da  MA Hui-yuan
Institution:1. China Electric Power Research Institute Co.,Ltd,Beijing 100192,China|2. Smart City College,Beijing Union University,Beijing 100101,China|3. Beijing Certificate Authority Co.,Ltd,Beijing 100080,China| 4.State Grid Beijing Electric Power Company,Beijing 100031,China
Abstract:In order to improve user experience,ensure the security of Internet application scenarios and realise mobile terminal signature with the application of mobile terminal password algorithm,password protocol and password products,based on secure multiparty computation,a series of interactive protocols are used to establish a multi-party cooperation method to realize password support. Based on the actual needs of current identity authentication and communication content protection,a scheme of SM2 controlled signature is designed based on the implementation principle of SM2 elliptic curve algorithm published by the National Cryptography Administration. The controlled signature scheme can generate and store part of the key components through multiple parties to accomplish crypto? graphic operations such as digital signatures. The controlled signature scheme can ensure the security of Internet application scenarios, realize the mobile signature,and improve the availability and security of the system.
Keywords:ubiquitous power Internet of things  controlled signature algorithm  cooperative cipher computation  cryptographic technology  secure multiparty computation  
点击此处可从《教育技术导刊》浏览原始摘要信息
点击此处可从《教育技术导刊》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号