Research Article
An Identity Authentication Scheme Based on SM2 Algorithm in UAV Communication Network
Table 2
Certification scheme parameter table.
| Order number | Main parameter | Illustration |
| 1 | | UAV control station | 2 | | Legal drones to be certified | 3 | | An elliptic curve over a finite domain | 4 | | Base point of the elliptic curve | 5 | | Order and formula parameters of the elliptic curves | 6 | | SM3 password miscellaneous algorithm | 7 | | Private keys for the control station and the drone | 8 | | Public key of the UAV to be certified | 9 | | Public key of the UAV control station | 10 | | Summary value of UAV and control station | 11 | | Identifiability signs of drones and control stations | 12 | | Random numbers generated by drones, control stations | 13 | | Elliptical curve points generated by the UAV | 14 | | The elliptical curve points generated by the control station | 15 | | Key derived functions | 16 | | The two-byte length of the | 17 | || | Represents a string splicing operation |
|
|