Novel skip list certification path generation method based on heap
An authentication path and new method technology, applied in the fields of information security and information authentication, can solve problems such as the need to improve efficiency, and achieve the effects of easy understanding, reduced redundancy, and simple and clear methods
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0059] The implementation steps of a new method for generating a heap-based jump table authentication path of the present invention can be achieved through the following deployment:
[0060] The present invention will be described in further detail in conjunction with accompanying drawing:
[0061] figure 2 , image 3 , Figure 4 , Figure 5 The working process of the present invention is shown.
[0062] Such as figure 2 , image 3 As shown, to figure 2 The authentication skip table is transformed into image 3 The heap shown is to build the heap on the basis of the authentication jump table according to the calculation of the node label value. The heap creation rules are as follows:
[0063] (1) For the leftmost node n, each node has only one child node, namely rchild(n):=down(n);
[0064] (2) For node n with level 0, there are two situations:
[0065] (a) If the left end node is not a plateau node, then it has only one child node, namely rchild(n):=down(n);
...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 