Safety two-direction vector advantage comparison method based on block chain
A blockchain and vector technology, applied in the field of cryptography and information security, can solve problems such as resistance, lack of feasibility, user privacy leakage, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0035] A method for comparing the advantages of secure two-way vectors based on blockchain, comprising the following steps:
[0036] S1. Suppose Alice holds vector A=[a 1 ...a n ], Bob holds vector B=[b 1 ...b n ], each element can be expressed as a K-bit integer;
[0037] S2. Key negotiation: Alice and Bob communicate and negotiate the parameters p and q required for ELGamal encryption, each in group Z q Select a random element S from A , S B , and calculate get in G q Select element f in , use h, f and group G q The generator g constructs the encryption key (g, h, f); among them, p and q are two large prime numbers, satisfying the condition p=2q+1, G q group The q factorial subgroup of , whose generator is g;
[0038] S3. Alice secretly shares her own data bit by bit, and sets the matrix A=[a 1 ...a n ] for each element a i It is divided into K shares, where 1≤i≤n, and each share contains the element a i A bit of can be expressed as [a i ] p =[[a i1 ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com