Two-factor Authentication Symmetric Searchable Encryption Method Based on Password and Anonymous Signcryption
A technology of two-factor authentication and encryption method, which is applied in the field of encryption, can solve problems such as unsatisfactory efficiency and no consideration of ID hiding.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] First, all algorithm participants should call Setup(1 λ ): Algorithm that starts with a security parameter of 1 λ For input, generate a long-term key to generate public parameters par L =(G' 1 , N, G 1 , g', q')←ɡ'(1 λ ), each participant of the algorithm saves this set of parameters and applies them to participate in subsequent operations.
[0051] Then, a long-term key generation center LK-KGC should be established, and LK-KGC calls LKeyGen(par L ,id U ) function, when LK-KGC is called, the long-term key will generate the public parameter par L and user id U ∈{0, 1} * As input, and output the user's long-term public key, private key pair (pk U , sk U ). The algorithm sets and outputs a key pair (pk U , sk U ). User ID U The binding between U and its public key U is authenticated by the certificate certA issued by the CA, which is public to all. LK-KGC sends each public key, private key pair to its corresponding user. Users save the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


