Anonymous participant identity-based signcryption method for multiple receivers
A multi-receiver and participant technology, which is applied in the field of multi-receiver signcryption where the identity of the participant is anonymous, can solve problems such as poor security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] refer to figure 1 The present invention will be described in detail.
[0033] Glossary.
[0034] TTP: Trusted third party, often acted by the key generation center, responsible for generating the private key of the sender and receiver;
[0035] z: system security parameters selected by the trusted third-party TTP;
[0036] q: a large prime number selected by the trusted third-party TTP, satisfying q>2 z ;
[0037] G 1 : The q-order additive cyclic group selected by the trusted third-party TTP;
[0038] G 2 : The q-factorial cyclic group selected by the trusted third-party TTP;
[0039] e: G selected by the trusted third-party TTP 1 and G 2 The bilinear map on e:G 1 ×G 1 →G 2 ;
[0040] A→B: mapping from domain A to value domain B;
[0041] P:G 1 The generator on is randomly selected by the trusted third-party TTP;
[0042] s: system master key, randomly selected by the trusted third-party TTP;
[0043] Z q * : non-zero multiplicative group based on pr...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com