Two-party distributed identity-based RSA digital signature generation method and system
A technology of digital signature and generation system, applied in the field of information security, which can solve the problems of weak signature key protection and key leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] The present invention is further elaborated below in conjunction with embodiment.
[0040] First, first explain the symbols and definitions.
[0041] A, B: The two sides of the communication.
[0042] gcd(a,b): the greatest common divisor of integer a and integer b, if gcd(a,b)=1, then a and b are said to be mutually prime.
[0043] The number of numbers in 1,2,...,n that are relatively prime to n.
[0044] g u : g to the power of u, namely where u is a positive integer.
[0045] h 1 (·),H 2 ( ): by {0,1} * arrive cryptographic hash function.
[0046] modn: modulo n operation.
[0047] ab: Integer a, b multiplied.
[0048] Second, the first is the signature key generation algorithm of both parties in communication.
[0049] In the present invention, the key generation center (KGC) is a trusted third party, which is mainly responsible for generating system parameters and signature keys. Given the identity ID of the user, in order to generate the partial ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com