Quantum-computing-resistant identity-based digital signature scheme
A digital signature and quantum computing technology, which is applied in the field of information security, can solve problems such as large amount of calculation and inability to resist quantum computing, and achieve the effect of strong implementation performance, improved security, and simple calculation form
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0073] The identity-based digital signature proposed by the present invention will be described below with reference to the specific embodiments.
[0074] Definitions A and B are the protocol participants, A is the signature party, B is the verification party, and the PKG is a credible key generator, which is a signature according to the following four phases.
[0075] System initialization
[0076] 1.1.pkg Select the appropriate integer n, m and r, record V = N-M, determine the limited domain F = GF (2 r )structure.
[0077] 1.2. The hash function h used by the PKG determination scheme.
[0078] 1.3.pkg Update the master key, update the partial parameters B, C and P of the public key mapping P k,1 , P k,2 , 1≤K≤m (if you don't need
[0079] Update the public key mapping P, skip this step):
[0080] PKG randomly selects the system key masterkey, perform the following:
[0081] DataPK = MasterKey PtimeStamp
[0082] Fork = 1 to m
[0083] Datapk = h (DataPK, V 2 )
[0084] P k,1 = ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap