An identity-based multi-receiver ring signcryption method with multiple security properties
A security attribute and multi-receiver technology, applied in the field of identity-based multi-receiver ring signcryption, can solve problems such as poor security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0055] Glossary.
[0056] PKG: private key generation center;
[0057] k: the secret parameter selected by the user, which is a long integer;
[0058] G 1 : The additive group of order q;
[0059] G 2 : the multiplicative group of order q;
[0060] q: large prime number, the order of the group, indicating that the group contains only q elements;
[0061] P:G 1 a generator of
[0062] P 0 : Additive group G 1 A random number in ;
[0063] s: a random number in the integer multiplication group;
[0064] Z q * : Integer multiplicative group modulo q;
[0065] P pub : system public key;
[0066] (E, D): symmetric encryption and decryption algorithm pair;
[0067] bilinear map;
[0068] params: parameter collection;
[0069] h 1 : One-way hash function, which can calculate a binary string of any length into a hash value in an additive group of order q;
[0070] h 2 : One-way hash function, which can calculate the string in the additive group with order q into...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


