Encrypted blind signature method based on obfuscation technology
A technology of blind signature and technology, applied in the field of cryptography, can solve the problems that cannot meet the actual application requirements, low efficiency, key leakage, etc., and achieve the effect of reducing data volume, improving execution efficiency, and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] Attached below figure 1 The present invention will be further described.
[0041] Step 1. Generate public parameters of the cryptographic system.
[0042] Randomly choose two independent large prime numbers p and q, where p and q are both greater than 2. λ ,λ represents the cryptographic system parameters determined by the key generation center, λ≤2 64 .
[0043] The key generation center uses a large prime q as the order to construct an additive cyclic group and a multiplicative cyclic group respectively.
[0044] The key generation center maps the additive cyclic group to the multiplicative cyclic group to obtain a bilinear mapping.
[0045] The key generation center randomly selects a generator from the additive cyclic group.
[0046] The key generation center publishes the public parameters generated above to the signer and receiver.
[0047] The public parameters are:
[0048] params=(p,q,G,G T ,e,g)
[0049] Among them, params represents public parameters, G represents additi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com