Method for certificateless cross-domain authentication in credible could computing environment
A cloud computing environment and authentication method technology, applied in the field of certificateless cross-domain authentication, to achieve the effect of reducing overhead, high security, and high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] The specific implementation manner of the method will be described in detail below in conjunction with the accompanying drawings.
[0031] Description of the main cryptography knowledge and security assumptions used in this method:
[0032] 1. Bilinear pairing: let G 1 , G 2 is the additive cyclic group and the multiplicative cyclic group of the prime number q in the middle order of the elliptic curve, and P is G 1 the generator of G , and G 1 The discrete logarithm problem on is intractable, then the bilinear map e:G between two groups 1 ×G 1 →G 2 satisfy the following properties:
[0033] (1) Bilinearity: e(aP,bQ)=e(P,Q) ab , for all P,Q∈G 1 ;a, b∈Z are all established;
[0034] (2) Non-degenerate: there is P, Q∈G 1 , making e(P,Q)≠1;
[0035] (3) Computability: For P, Q∈G 1 , there is an efficient algorithm to compute e(P,Q).
[0036] 2. This method assumes that the central authentication server S is a trusted third party and can accurately respond to each...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com