An Efficient Aggregate Signature Method
An efficient and signature verification technology, applied in the field of information security, can solve the problems of network security environment not suitable for computing resources and limited bandwidth, low efficiency of aggregated signature calculation, slow transmission speed, etc., saving storage space and strong practicability , to achieve a simple effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040]Referring to the accompanying drawings, through the description of the embodiments, the specific embodiments of the present invention include the shape, structure, mutual position and connection relationship of each part, the function and working principle of each part, and the manufacturing process of the various components involved. And the method of operation and use, etc., are described in further detail to help those skilled in the art have a more complete, accurate and in-depth understanding of the inventive concepts and technical solutions of the present invention.
[0041] The applied mathematical theory of the embodiments of the present invention:
[0042] 1. Elliptic curve discrete logarithm problem
[0043] The elliptic curve discrete logarithm problem is: Suppose E(F c ) is a finite field F c On the elliptic curve, it is known that P is E(F c ) of a generator of order q, when Q∈E(F c ) and Q=k·P, find the integer k (0≤k≤q-1).
[0044] 2. Trapdoor hash fu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


