Combination public key authentication password method based on conic curves

A technology of conic section and combined public key, which is applied in the field of authentication cryptography based on conic section combined public key, and can solve the problems of configuring complex cloud computing environment and so on.

Inactive Publication Date: 2014-01-01
ZHEJIANG UNIV OF TECH
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims to solve the existing shortcomings of the authentication and encryption method in the cloud computing environment. On the one hand, IBE’s own key escr...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Combination public key authentication password method based on conic curves
  • Combination public key authentication password method based on conic curves
  • Combination public key authentication password method based on conic curves

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below in conjunction with the accompanying drawings.

[0030] For realizing above-mentioned technical task, the technical solution that the present invention takes the following steps:

[0031] Step 1. Generate a ring based on the remaining class Public cryptographic parameters of conic sections

[0032] Assume is a remainder-like ring modulo n, defining the ring Conic section C on n (a,b) is the congruence equation y 2 ≡ax 2 -bx(mod n) in The solution set above, where a, b∈Z, (a, n)=(b, n)=1, n=pq, p, q are two different large odd prime numbers, mod is a modulo operation; the origin O =(0,0)∈C n (a,b), remember If satisfied And p+1=2r, q+1=2s, r and s are prime numbers, then the curve C n (a,b) exists a point G whose order N n =lcm{|C p (a,b)|,|C q (a,b)|}={p+1,q+1}=2rs, where lcm(x,y) is the function for calculating the least common multiple, |C p (a,b)| and |C q (a,b)|respectively are the conic c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A combination public key authentication password method based on conic curves includes the following steps that 1, a public password parameter based on a residual class ring conic curve is generated; 2, public and private secret keys based on residual class ring conic curves are generated; 3, a primary algorithm based on a combination public key password method based on the conic curves is used.

Description

technical field [0001] The invention relates to a conic section combined public key authentication encryption method, which is suitable for identification authentication of big data processing in a cloud computing environment. technical background [0002] In contemporary society, from astronomy and geography, artificial intelligence, information security to census, traffic information, various images, videos, music, text and other multimedia information processing, the data scale is getting larger and larger, reaching TB level, even to PB level, these Data are massive, heterogeneous, semi-structured or unstructured. In order to support the sharing and collaboration of cloud services and the needs of big data processing in a dynamic, heterogeneous and distributed cloud computing environment, on the one hand, many process entities are generated during the scheduling and execution of cloud services, and these entities need to be managed; on the other hand On the one hand, it ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30
Inventor 于明远赵航黄书杭禹晴刘希伟叶蕾
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products