Signcryption method of biological features of a plurality of receivers
A biometric and multi-receiver technology, applied in the computer field, can solve problems such as low decryption efficiency and sender identity confirmation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0064] Attached below figure 1 The present invention will be further described.
[0065] Step 1. System parameter generation
[0066] According to the security parameter κ, the key generation center selects a large prime number q (q>2 κ ), construct two q-th order additive cyclic group G 1 And multiplicative cyclic group G 2 ; And construct a bilinear map, namely e: G 1 ×G 1 →G 2 ; From group G 1 Randomly select generator P, randomly select system master key And an element P 0 ∈G 1 , Calculate the corresponding system public key P pub =sP; Construct 5 password one-way hash functions, denoted as: H 1 : { 0,1 } i X { 0,1 } * → z q * ; H 2 : { 0,1 } * → Z q * ; H 3 : G 2 →{0, 1} l ; H 4 : {0, 1} l →{0, 1} l ; Key generation center constructs a fuzzy extraction algorithm, including feature extraction function F b , Encoding function E b , Decoding function D b , And select an encryption algorithm (E...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com