Generation and authentication method of self-certified public key of mobile self-organized network
A mobile self-organization and public key technology, applied in the field of network security, can solve the problems of key escrow, large amount of calculation, and impracticability, and achieve the effect of improving calculation and communication volume, avoiding key escrow, and reducing storage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] A, the applied mathematical theory of the present invention
[0033] (A1) Elliptic Curve Cryptosystem ECC
[0034] Let p and q be large prime numbers, GF(q) is a finite field of order q, E is an elliptic curve on GF(q), E(GF(q)) is a cyclic group of order p formed by points on E, P∈ E(GF(q)) is the generator. For the definition of elliptic curve and the selection of security parameters, please refer to the literature: Don Johnson, Alfred Menezes and Scott Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA), IJLS, vol.1 issue1 (2001), 36-63.
[0035] (A2) Hash function
[0036] The Hash function is a function that transforms an input message of arbitrary length into an output message of fixed length, and this output is called the Hash value of the message. A secure Hash function should at least meet the following conditions: ①The input length is arbitrary; ②The output length is fixed, at least 128 bits long, so as to resist birthday attacks; ③For each giv...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com