A shared key generation method, and an information processing terminal
A technology for sharing keys and terminals, which is applied to public keys and key distribution in secure communication, and can solve problems such as high computing costs.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 approach
[0026] Overall configuration
[0027] figure 1 It is a diagram showing an example of the overall configuration of the system according to the embodiment. Such as figure 1 As shown, the system in which the server 1, the information processing terminal 10 and the information processing terminal 20 are connected via the network N implements identity-based cryptography between the information processing terminals 10 and 20, wherein the identity-based cryptography uses the MB method Key sharing. Any type of communication network such as the Internet, local area network (LAN), virtual private network (VPN) can be adopted as the network N, regardless of whether it is wired or wireless.
[0028] The server 1 is a private key generation center (PKG), and transmits the private key to the respective information processing terminals 10 and 20. The information processing terminal 10 is a computer used by user A (hereinafter may be referred to as main body A), and the information processing te...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


