Intelligent household digital signcryption method and system based on asymmetric key pool
A smart home, asymmetric technology, applied in digital transmission system, transmission system, key distribution, can solve the problem of stealing information, malicious software or malicious operation stealing, cracking, etc., to achieve the effect of ensuring communication security and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0094] 1. M generates message signcryption based on F and sends it to S
[0095] 1.1. M takes a random number rim, uses the function FM (for example, splitting a number into three segments according to the length of 2:3:5) to act on rim to get three numbers rim1, rim2 and rim3, and then uses rim1 to encrypt from the client Take kim1 / Kim1 from the client asymmetric key pool (private key pool / public key pool) of the key card, and use rim2 to take Kim2 from the home gateway asymmetric key pool (public key pool) of the client key card.
[0096] Let xm=rim3, according to the formula km=Kim2 xm Mod p calculates the value of km, and then uses the function fm1 (for example, splitting a number into two segments according to the length of 1:1) to act on km to obtain two numbers: the first intermediate parameter km1 and the second intermediate parameter km2.
[0097] 1.2. Take the keyed hash function KH and act on the original text F and km2 to obtain the signcryption authentication co...
Embodiment 2
[0113] 1. M generates message signcryption based on F and sends it to C
[0114] 1.1. M takes a random number rim, uses the function FM (for example, splitting a number into three segments according to the length of 2:3:5) to act on rim to get three numbers rim1, rim2 and rim3, and then uses rim1 to encrypt from the client Take kim1 / Kim1 from the client asymmetric key pool (private key pool / public key pool) of the key card, and use rim2 to take Kim2 from the home gateway asymmetric key pool (public key pool) of the client key card.
[0115] Let xm=rim3, according to the formula km=Kim2 xm Mod p calculates the value of km, and then uses the function fm1 (for example, splitting a number into two segments according to the length of 1:1) to act on km to obtain two numbers: the first intermediate parameter km1 and the second intermediate parameter km2.
[0116] 1.2. Take the keyed hash function KH and act on the original text F and km2 to obtain the signcryption authentication co...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com