Research Article

An Identity Authentication Scheme Based on SM2 Algorithm in UAV Communication Network

Table 2

Certification scheme parameter table.

Order numberMain parameterIllustration

1UAV control station
2Legal drones to be certified
3An elliptic curve over a finite domain
4Base point of the elliptic curve
5Order and formula parameters of the elliptic curves
6SM3 password miscellaneous algorithm
7Private keys for the control station and the drone
8Public key of the UAV to be certified
9Public key of the UAV control station
10Summary value of UAV and control station
11Identifiability signs of drones and control stations
12Random numbers generated by drones, control stations
13Elliptical curve points generated by the UAV
14The elliptical curve points generated by the control station
15Key derived functions
16The two-byte length of the
17||Represents a string splicing operation