CFL centralized management mode implementation method
A technology for centralized management and implementation methods, applied in the field of information security, can solve problems that are not conducive to centralized management
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] The CFL centralized management mode realization method of the present invention is made of following five algorithms:
[0050] Algorithm 1: CFL centralized management mode CFL certificate generation center identification public and private key generation element set generation algorithm
[0051] 1) The CFL certificate generation center uses a random number generator to randomly generate an identification private key generation element set:
[0052] IDSKG={sk 0 ,sk 1 ,...,sk L-1}
[0053] Among them, the elements must be independently generated, pass the randomness test, and be different in pairs, and are unique to the CFL certificate generation center.
[0054] 2) The CFL certificate generation center generates the corresponding identity public key generation element set based on the identification private key generation element set:
[0055] IDPKG={pk 0 , pk 1 ,...,pk L-1},
[0056] where pk i is the private key sk in the public key cryptography algorithm i ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


