tencent cloud



Last updated: 2024-01-11 16:31:21
In sensitive information transmission, the information sender can provide the identity certification through asymmetric signature verification. The operation process is as follows:
1. Create a pair of asymmetric keys in the KMS console. For more information, please see CreateKey.
2. The information sender uses the created private key to generate a signature for the data to be transmitted. For more information, please see SignByAsymmetricKey.
3. The information sender transmits the signature and data to the information recipient.
4. After receiving the signature and data, the information recipient verifies the signature by one of the two methods below: ① Call the KMS signature verification API to verify the signature. For more information, please see VerifyByAsymmetricKey. ② Download the KMS public asymmetric key, and then locally verify the signature using GmSSL, OpenSSL, password library, KMS SM-CRYPTO Encryption SDK, or any other tools.
Asymmetric signature verification currently supports SM2, RSA, and ECC algorithms.
Contact Us

Contact our sales team or business advisors to help your business.

Technical Support

Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

7x24 Phone Support