GM/T 0130-2023 PDF English
US$440.00 · In stock · Download in 9 secondsGM/T 0130-2023: Certificateless and implicit-certificate-based public key mechanisms based on the SM2 algorithms Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
GM/T 0130-2023 | English | 440 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Certificateless and implicit-certificate-based public key mechanisms based on the SM2 algorithms
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0130-2023
GM/T 0130-2023: Certificateless and implicit-certificate-based public key mechanisms based on the SM2 algorithms ---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0130-2023
GM
CRIPTOGRAPHIC INDUSTRY STANDARD
ICS 35.030
CCS L 80
Certificateless and implicit-certificate-based public key
mechanisms based on the SM2 algorithms
Issued on. DECEMBER 04, 2023
Implemented on. JUNE 01, 2024
Issued by. State Cryptography Administration
Table of Contents
Foreword... 3
Introduction... 4
1 Scope... 5
2 Normative references... 5
3 Terms and definitions... 6
4 Symbols and abbreviations... 7
4.1 Symbols... 7
4.2 Abbreviations... 9
5 Mechanism parameters and auxiliary functions... 10
5.1 Overview... 10
5.2 Elliptic curve system parameters... 10
5.3 Auxiliary functions... 11
5.4 User identification information... 12
6 Key generation mechanism and process... 12
6.1 Master key generation mechanism... 12
6.2 User key pair generation mechanism... 12
6.3 User key pair generation process... 13
6.4 User key pair verification mechanism... 14
6.5 User key pair verification process... 15
7 Digital signature mechanism... 16
7.1 Digital signature generation mechanism... 16
7.2 Verification mechanism of digital signature... 16
8 Public key encryption mechanism... 16
8.1 Encryption mechanism... 16
8.2 Decryption mechanism... 17
Appendix A (Informative) Mechanism data example... 18
Appendix B (Informative) Application example of mechanism in implicit certificate
application... 26
Appendix C (Informative) Application example of the mechanism in the industrial
Internet identity resolution system... 31
Appendix D (Informative) Deterministic generation method of user key of key
generation center... 35
References... 36
Certificateless and implicit-certificate-based public key
mechanisms based on the SM2 algorithms
1 Scope
This document specifies the certificateless and implicit certificate public key
mechanism based on the SM2 algorithm, including key generation and verification
mechanism, digital signature mechanism, public key encryption mechanism.
The digital signature mechanism specified in this document is applicable to digital
signatures and verification in commercial cryptographic applications; the encryption
mechanism is applicable to message encryption and decryption in commercial
cryptographic applications. The mechanism specified in this document is particularly
suitable for application environments with limited bandwidth and computing resources.
2 Normative references
The contents of the following documents constitute the essential terms of this document
through normative references in the text. Among them, for dated references, only the
version corresponding to that date applies to this document; for undated references, the
latest version (including all amendments) applies to this document.
GB/T 32918.1-2016 Information security technology - Public key cryptographic
algorithm SM2 based on elliptic curves - Part 1.General
GB/T 32918.2-2016 Information security technology - Public key cryptographic
algorithm SM2 based on elliptic curves - Part 2.Digital signature algorithm
GB/T 32918.4-2016 Information security technology - Public key cryptographic
algorithm SM2 based on elliptic curves - Part 4.Public key encryption algorithm
GB/T 32918.5-2017 Information security technology - Public key cryptographic
algorithm SM2 based on elliptic curves - Part 5.Parameter definition
GB/T 32905 Information security techniques - SM3 cryptographic hash algorithm
GB/T 32915 Information security technology - Randomness test methods for binary
sequence
4.2 Abbreviations
The following abbreviations apply to this document.
CA. Certificate Authority
5 Mechanism parameters and auxiliary functions
5.1 Overview
The public key mechanism specified in this document includes key generation and
verification mechanism, digital signature mechanism, public key encryption
mechanism. Among them, the key generation and verification mechanism includes the
generation mechanism of the master key and the generation and verification mechanism
and process of the user key pair.
5.2 Elliptic curve system parameters
The elliptic curve system parameters include the scale q of the finite field Fq (when q =
5.4 User identification information
User A has an identification IDA of length entlenA bits, where ENTLA is two bytes
converted from the integer entlenA. The KGC of the key generation mechanism
specified in this document, the signer and verifier of the digital signature mechanism,
6 Key generation mechanism and process
6.1 Master key generation mechanism
KGC uses the random number ms∈[1, n - 1] as the system master private key, to
calculate the system master public key Ppub = [ms]G.
6.2 User key pair generation mechanism
User A and KGC work together to generate the user's key pair. User private key dA and
declaration public key WA. Both shall implement the following operation steps.
7 Digital signature mechanism
7.1 Digital signature generation mechanism
Let the message to be signed be M. In order to obtain the digital signature (r, s) of
message M, user A as the signer shall implement the following operation steps.
7.2 Verification mechanism of digital signature
In order to verify the received message M' and its digital signature (r's'), user B as the
verifier shall implement the following operation steps.
8 Public key encryption mechanism
8.1 Encryption mechanism
Let the message to be sent be a bit string M. In order to encrypt the plaintext M and
GM/T 0130-2023
GM
CRIPTOGRAPHIC INDUSTRY STANDARD
ICS 35.030
CCS L 80
Certificateless and implicit-certificate-based public key
mechanisms based on the SM2 algorithms
Issued on. DECEMBER 04, 2023
Implemented on. JUNE 01, 2024
Issued by. State Cryptography Administration
Table of Contents
Foreword... 3
Introduction... 4
1 Scope... 5
2 Normative references... 5
3 Terms and definitions... 6
4 Symbols and abbreviations... 7
4.1 Symbols... 7
4.2 Abbreviations... 9
5 Mechanism parameters and auxiliary functions... 10
5.1 Overview... 10
5.2 Elliptic curve system parameters... 10
5.3 Auxiliary functions... 11
5.4 User identification information... 12
6 Key generation mechanism and process... 12
6.1 Master key generation mechanism... 12
6.2 User key pair generation mechanism... 12
6.3 User key pair generation process... 13
6.4 User key pair verification mechanism... 14
6.5 User key pair verification process... 15
7 Digital signature mechanism... 16
7.1 Digital signature generation mechanism... 16
7.2 Verification mechanism of digital signature... 16
8 Public key encryption mechanism... 16
8.1 Encryption mechanism... 16
8.2 Decryption mechanism... 17
Appendix A (Informative) Mechanism data example... 18
Appendix B (Informative) Application example of mechanism in implicit certificate
application... 26
Appendix C (Informative) Application example of the mechanism in the industrial
Internet identity resolution system... 31
Appendix D (Informative) Deterministic generation method of user key of key
generation center... 35
References... 36
Certificateless and implicit-certificate-based public key
mechanisms based on the SM2 algorithms
1 Scope
This document specifies the certificateless and implicit certificate public key
mechanism based on the SM2 algorithm, including key generation and verification
mechanism, digital signature mechanism, public key encryption mechanism.
The digital signature mechanism specified in this document is applicable to digital
signatures and verification in commercial cryptographic applications; the encryption
mechanism is applicable to message encryption and decryption in commercial
cryptographic applications. The mechanism specified in this document is particularly
suitable for application environments with limited bandwidth and computing resources.
2 Normative references
The contents of the following documents constitute the essential terms of this document
through normative references in the text. Among them, for dated references, only the
version corresponding to that date applies to this document; for undated references, the
latest version (including all amendments) applies to this document.
GB/T 32918.1-2016 Information security technology - Public key cryptographic
algorithm SM2 based on elliptic curves - Part 1.General
GB/T 32918.2-2016 Information security technology - Public key cryptographic
algorithm SM2 based on elliptic curves - Part 2.Digital signature algorithm
GB/T 32918.4-2016 Information security technology - Public key cryptographic
algorithm SM2 based on elliptic curves - Part 4.Public key encryption algorithm
GB/T 32918.5-2017 Information security technology - Public key cryptographic
algorithm SM2 based on elliptic curves - Part 5.Parameter definition
GB/T 32905 Information security techniques - SM3 cryptographic hash algorithm
GB/T 32915 Information security technology - Randomness test methods for binary
sequence
4.2 Abbreviations
The following abbreviations apply to this document.
CA. Certificate Authority
5 Mechanism parameters and auxiliary functions
5.1 Overview
The public key mechanism specified in this document includes key generation and
verification mechanism, digital signature mechanism, public key encryption
mechanism. Among them, the key generation and verification mechanism includes the
generation mechanism of the master key and the generation and verification mechanism
and process of the user key pair.
5.2 Elliptic curve system parameters
The elliptic curve system parameters include the scale q of the finite field Fq (when q =
5.4 User identification information
User A has an identification IDA of length entlenA bits, where ENTLA is two bytes
converted from the integer entlenA. The KGC of the key generation mechanism
specified in this document, the signer and verifier of the digital signature mechanism,
6 Key generation mechanism and process
6.1 Master key generation mechanism
KGC uses the random number ms∈[1, n - 1] as the system master private key, to
calculate the system master public key Ppub = [ms]G.
6.2 User key pair generation mechanism
User A and KGC work together to generate the user's key pair. User private key dA and
declaration public key WA. Both shall implement the following operation steps.
7 Digital signature mechanism
7.1 Digital signature generation mechanism
Let the message to be signed be M. In order to obtain the digital signature (r, s) of
message M, user A as the signer shall implement the following operation steps.
7.2 Verification mechanism of digital signature
In order to verify the received message M' and its digital signature (r's'), user B as the
verifier shall implement the following operation steps.
8 Public key encryption mechanism
8.1 Encryption mechanism
Let the message to be sent be a bit string M. In order to encrypt the plaintext M and
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0130-2023 be delivered?Answer: The full copy PDF of English version of GM/T 0130-2023 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0130-2023_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0130-2023_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0130-2023 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GM/T 0130-2023?A step-by-step guide to download PDF of GM/T 0130-2023_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GM/T 0130-2023". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|