An identity-based distributed authentication method and system in a multi-server environment
A multi-server and authentication method technology, applied in the field of identity-based distributed authentication generation methods and systems, can solve problems such as key disclosure attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] In the following description of the present invention, RC means a registration center, which is responsible for selecting coefficient parameters, generating master private keys, and generating user and server private keys. G 1 is an additive cyclic group of order prime q, G T is a multiplicative cyclic group of order prime q. When two integers are multiplied (or integer symbols multiplied), if there is no ambiguity, the multiplication sign "·" is omitted, for example, a·b is simplified to ab. When multiplying integers and points, do not omit the multiplication sign "·" if there is no ambiguity. For example, a·P cannot be simplified to aP.
[0052] mod q represents the modulo q operation, and the priority of the modulo q operation is the lowest, for example, a+b(mod q) is equivalent to (a+b)modq, and ab mod q is equivalent to (ab)mod q. "≡" represents a congruence formula, that is, a≡b(mod q) is equivalent to a(mod q)=b(mod q). gcd(a, b) means finding the greatest co...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

