Supercharge Your Innovation With Domain-Expert AI Agents!

Three-party decryption method based on parent-child relationship verification

A technology of parent-child relationship, parent element, applied in the usage of multiple keys/algorithms, transmission systems, digital transmission systems, etc.

Active Publication Date: 2019-10-18
政采云有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But for the md5 information summary, it can be cracked by using exhaustive strings

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-party decryption method based on parent-child relationship verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be specifically introduced below in conjunction with the accompanying drawings and specific embodiments.

[0045] Such as figure 1 Shown is a three-party decryption method based on parent-child relationship verification of the present invention. The method is based on parent-child relationship verification. In an element set, for example, for the element set {A, B, C}, the elements in the element set satisfy f (A)=B, and f(B)=C, we believe that each element in the element set satisfies the parent-child relationship function f(x), and elements A, B, and C satisfy the parent-child relationship. Among them, element A is the parent element of element B, element B is the child element of element A, element B is the parent of element C, and element C is the child of element B. And the parent element of element A is not included in the element set, we call element A the root, and the child element of element C is not included in the element set, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a three-party decryption method based on father-child relationship verification, and the method comprises the steps: inputting a first secret key, a second secret key and a third secret key into an encryption module, the first secret key being a father-child relationship function, the second secret key being a first element set, and the third secret key being a second element set; enabling the encryption module to identify elements meeting the father-son relationship function in the first element set of the second key through the father-son relationship function of thefirst key; selecting elements which do not meet the father-son relationship function in the first element set to form a third element set; enabling the encryption module to compare the second set of elements and the third set of elements and unencrypts when the elements of the second set of elements and the third set of elements are completely the same. The three-party decryption method based on parent-child relationship verification has the advantages that the relevance of the three-party secret key is judged in a parent-child relationship verification mode, and encryption is relieved when the three-party secret key meets a certain preset relationship.

Description

technical field [0001] The invention relates to a three-party decryption method based on parent-child relationship verification. Background technique [0002] In practical applications, there are the following scenarios: a certain software function or file is encrypted by encryption software, and it needs three people to enter the key to decrypt it to release the encryption of the encryption software to use the software or open the encrypted file. This requires each of the three people to hold a set of keys, and the contents of the three sets of honey keys are different. When the three sets of keys are input into the password program as three parameters at the same time, the password unlocking program will be triggered . [0003] The existing method generally is that the key in the hands of the three people is an information summary calculated by the md5 algorithm, and the three information summaries are different. But for the md5 information summary, it can be cracked by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/14
CPCH04L9/0869H04L9/0861H04L9/14
Inventor 李乐斌陈洁
Owner 政采云有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More