Identity-based key generation method and identity-based authentication method
A technology of key generation and authentication methods, which is applied in the field of communication and information security, can solve problems such as complex key management, and achieve the effect of simple key management, ensuring privacy and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings.
[0023] An embodiment of an identity-based key generation method of the present invention
[0024] Different from the traditional PKI / CA technical mechanism, in the identity-based cryptographic system, the user's public identity information (such as e-mail address, IP address, name, etc.) is used as the public key part of the user's public key / private key pair. Private keys are generated by a trusted third party called a Private Key Generator (PKG). An identity-based cryptosystem such as figure 1 as shown,
[0025] ①Users and application servers submit their identity information to the security center for registration;
[0026] ②The security center accepts the registration request and submits the identity information in the registration request to the key server;
[0027] ③The key server generates the identity private key according to the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com