tencent cloud

All product documents
Key Management Service
Overview
Last updated: 2024-01-11 16:31:21
Overview
Last updated: 2024-01-11 16:31:21
In sensitive information transmission, the information sender can provide the identity certification through asymmetric signature verification. The operation process is as follows:
1. Create a pair of asymmetric keys in the KMS console. For more information, please see CreateKey.
2. The information sender uses the created private key to generate a signature for the data to be transmitted. For more information, please see SignByAsymmetricKey.
3. The information sender transmits the signature and data to the information recipient.
4. After receiving the signature and data, the information recipient verifies the signature by one of the two methods below: ① Call the KMS signature verification API to verify the signature. For more information, please see VerifyByAsymmetricKey. ② Download the KMS public asymmetric key, and then locally verify the signature using GmSSL, OpenSSL, password library, KMS SM-CRYPTO Encryption SDK, or any other tools.
Note:
Asymmetric signature verification currently supports SM2, RSA, and ECC algorithms.
Was this page helpful?
You can also Contact Sales or Submit a Ticket for help.
Yes
No

Feedback

Contact Us

Contact our sales team or business advisors to help your business.

Technical Support

Open a ticket if you're looking for further assistance. Our Ticket is 7x24 available.

7x24 Phone Support
Hong Kong, China
+852 800 906 020 (Toll Free)
United States
+1 844 606 0804 (Toll Free)
United Kingdom
+44 808 196 4551 (Toll Free)
Canada
+1 888 605 7930 (Toll Free)
Australia
+61 1300 986 386 (Toll Free)
EdgeOne hotline
+852 300 80699
More local hotlines coming soon