Digital signature scheme based on ECC
A digital signature and scheme technology, applied in the direction of user identity/authority verification, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] When the specific operation is implemented, all parameters of the algorithm are determined by a trusted third-party authority. Make part of the parameters public, and keep the other part of the parameters strictly confidential, and set the corresponding parameters into device A. For simplicity, this embodiment selects the P-192 elliptic curve on the prime number field recommended by NIST and some simple parameters. The specific process is as follows:
[0046] 1. The elliptic curve parameters (p, a, b, G, n, h) etc. are selected by the authoritative trust agency:
[0047] Elliptic curve equation y2=x3-ax-b
[0048] P=2 192 -2 64 -1
[0049] a=-3(mod p)=p-3=2 192 -2 64 -2 2
[0050] b=0x 64210519 E59C80E7 0FA7E9AB 72243049 FEB8DEEC C146B9B1
[0051] G x =0x 188DA80E B03090F6 7CBF20EB 43A18800 F4FF0AFD 82FF1012
[0052] G y=0x 07192B95 FFC8DA78 631011ED 6B24CDD5 73F977A1 1E794811
[0053] n=0x FFFFFFFF FFFFFFFF FFFFFFFF 99DEF836 146BC9B1 B4D22831
[0054] ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com