Controllable anonymous authentication method, system and device based on ciphertext packet link encryption
An anonymous authentication and group encryption technology, applied in the blockchain field, can solve the problems of single point attack, loss of security of anonymous certificates, dishonesty of supervisor nodes, etc., to achieve the effect of high decryption efficiency and improved security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0078] In order to clearly illustrate the present invention and make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the following describes the technical solutions in the embodiments of the present invention clearly and completely with reference to the accompanying drawings in the embodiments of the present invention. It enables those skilled in the art to refer to the description text and implement accordingly. The technology of the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.
[0079] The HMAC algorithm is a key-based verification method for message integrity, and its security is based on the Hash encryption algorithm. It requires both parties to share a key, agree on an algorithm, and perform Hash operation on the message to form a fixed-length authentication code. Both parties of the communication determine the validity of the message by chec...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


