1 Scope
This part of GB/T 32918 specifies the digital signature algorithm of public key cryptographic algorithm SM2 based on elliptic curves, including generation and verification algorithm of digital signature, and gives examples of digital signature and verification and their corresponding processes.
This part is applicable to digital signature and verification in commercial cryptographic application and can satisfy security requirements of identity authentication and data integrity & authenticity in multiple cryptographic applications.
2 Normative References
The following referenced documents are indispensable for the application of this document. For dated reference, only the edition cited applies. For undated reference, the latest edition of the referenced document (including any amendments) applies.
GB/T 32918.1-2016 Information Security Technology — Public Key Cryptographic Algorithm SM2 based on Elliptic Curves — Part 1: General
GB/T 32905-2016 Information Security Techniques — SM3 Cryptographic Hash Algorithm
3 Terms and Definitions
For the purposes of this document, the following terms and definitions apply.
3.1
message
a bit string with any finite length
3.2
signed message
a set of data items consisting of message and its signature part
3.3
signature key
a private secret data item of the signer in the digital signature process, i.e. the private key of the signer
3.4
signature process
the process of inputting the message, signature key and elliptic curve system parameters as well as outputting digital signature
Foreword II
Introduction III
1 Scope
2 Normative References
3 Terms and Definitions
4 Symbols
5 Digital Signature Algorithm
5.1 General
5.2 Elliptic Curve System Parameters
5.3 User Key Pair
5.4 Auxiliary Functions
5.5 Other Information on the User
6 Generation Algorithm and Process of Digital Signature
6.1 Generation Algorithm of Digital Signature
6.2 Generation Algorithm and Process of Digital Signature
7 Verification Algorithm and Process of Digital Signature
7.1 Verification Algorithm of Digital Signature
7.2 Verification Algorithm and Process of Digital Signature
Annex A (Informative) Digital Signature and Verification Example
A.1 General
A.2 Digital Signature of Elliptic Curve over Fq
A.3 Digital Signature of Elliptic Curve over
Bibliography