Zero knowledge identity authentication method based on strong primes
An identity authentication and zero-knowledge technology, applied in the field of identity authentication and computer information security, can solve the problems of high number of interactions, high system performance requirements, and reduction, and achieve the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0043] A zero-knowledge identity authentication method based on strong prime numbers, comprising the following steps:
[0044] In the first step, the trusted center generates strong prime numbers and selects strong prime numbers that meet the conditions:
[0045] The trusted center is similar to the certification authority (CA, certification authority) in public cryptography, but the trusted center has stronger functions and needs to generate strong prime numbers and select prime numbers for calculation. In public cryptography, a certificate authority certifies a public key belonging to a particular entity (either a person or a network entity). For a certified public key, if a person fully trusts the CA's certification of the public key, he can also determine the owner of the key. It can be seen that in the identity authentication system, the trusted center acts as a facilitator, assisting both parties who need authentication to complete the identity authentication work.
[...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com