Message verification method, device and equipment and readable storage medium
A verification method and message technology, which is applied in the field of information security, can solve problems such as large amount of calculation, slow verification efficiency, and large amount of verification calculation, and achieve the effects of improving efficiency, reducing calculation amount and calculation complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0055]At present, the existing partial blind proxy re-signature scheme has a large amount of calculation and high computational complexity, and the computing power of each terminal in the mobile Internet is relatively low, which cannot undertake the verification process of high complexity. Therefore, the existing partial blind The proxy re-signature scheme cannot be applied to the mobile Internet. For this reason, this application provides a message verification scheme, which can re...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


