Key Generation and Distribution Method Based on Composite Key System
A key generation and combination key technology, applied to key distribution, can solve the problem that the key authentication system cannot provide user private key protection, so as to prevent malicious counterfeiting of user private key for illegal operations, protect user privacy, and prevent Duplicated and Tampered Effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] In the following, the present invention will be further described in conjunction with the drawings and specific embodiments.
[0028] Such as figure 1 As shown, a key generation and distribution method based on the combined key system is applied in the key authentication system. The key authentication system includes a user terminal entity, a key management subsystem and a registration management subsystem.
[0029] This embodiment is constructed based on Elliptic Curve Cryptography (ECC). The elliptic curve discrete logarithm problem is the mathematical basis for the security of this method. The selected elliptic curve group and quintuple (a, b, G, n, p) are defined:
[0030] p: is a large prime number, and the elliptic curve is built on the finite field modulo p.
[0031] a, b: are non-negative integers less than p, set in the cubic equation y 3 =x 3 +ax+b(modp), all non-negative integer pairs (x, y) less than p that satisfy the equation plus an infinity point O...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 