## GB/T 32918.4-2016: Translated English of Chinese Standard. (GBT 32918.4-2016, GB/T32918.4-2016, GBT32918.4-2016): Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 4: Public key encryption algorithmThis Part of GB/T 32918 specifies public key encryption algorithm of public key cryptographic algorithm SM2 based on elliptic curves. It gives the message encryption and decryption examples as well as the corresponding process. This Part applies to message encryption and decryption in commercial password applications. The sender of the message can encrypt the message with the receiver public key. The receiver decrypts with the corresponding private key to obtain the message. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Other editions - View all

### Common terms and phrases

algorithm SM2 based auxiliary functions base point based on elliptic bit length bit strings according C1 satisfies Calculate elliptic curve Calculate Step Calculate the elliptic ciphertext C=C1 Convert the data cryptographic hash algorithm curve point Yes curve system parameters curve’s discrete logarithm data Elliptic curve’s data type Decryption algorithm flow discrete logarithm problem elliptic curve E(Fq elliptic curve parameters elliptic curve point Elliptic curve system elliptic curve’s discrete encryption algorithm based encryption and decryption error and exit following operation steps GB/T integer greater key data key derivation function key encryption algorithm key exchange protocol klen/v method given multiple-point-multiplication operation National Cryptographic Authority Output ciphertext Password hash algorithm plaintext point G private key dB public key cryptographies public key cryptosystem public key encryption random number report an error secret bit string shared secret bit signature algorithm SM3 cryptographic hash Take the bit type of C1 User B's Verify whether C1 Yes No Step