Method for secret protection in group key initial allocation
A technology of privacy protection and group key, which is applied in the field of privacy protection in the initial distribution of group keys, and can solve the problems of not considering group keys and privacy information protection, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0048] The present invention shows a specific implementation mode of the present invention by taking a specific implementation of a small size as an example, and the larger the selected size, the higher the security.
[0049] System parameter selection:
[0050] Elliptic Curve: E:y 2 ≡x 3 +2x+24(mod 97), where a=2, b=24, p=97
[0051] Generator of elliptic curve: P=(2,6)
[0052] The order of generator P: n=103
[0053] Group key message: m=5
[0054] Private key of the group key issuer: d A =3
[0055] Public key of group key issuer: A=d A P(mod p)=3(2,6)(mod 97)=(69,61)
[0056] Private keys of applicants joining the group for the first time: d B =4
[0057] The public key of the applicant who joins the group for the first time: B=d B P(mod p)=4(2,6)(mod 97)=(59,50)
[0058] The specific implementation of the present invention includes three stages of group key issuance, group key verification and third-party certification.
[0059] s1. Group key issuance phase ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com