Generation of cryptographic signatures using hash keys
A technique for ciphering and ciphering, applied in the field of authenticated information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] As previously mentioned, FIG. 1 illustrates a satellite communication system in which incoming signals are encrypted by an encoder / transmitter 10 and transmitted to a satellite 12 for distribution to a plurality of receivers 14,16 and 18. As shown in FIG. Each receiver has a sub-set of different confirmation rights taken from the weight sets S0, S1, S2, S3, S4, . . . SN. The authorization rights allow different receivers to access different information signals (eg, television programs) distributed by the satellite 12 .
[0038] Such as image 3 The present invention shown can overcome the disadvantages of complex calculations required by the prior art linear hybrid approach (FIG. 2). should understand image 3 The specific embodiment shown is an example only. image 3 In particular, a simple binary tree-like chaining embodiment is shown in which information from three different information groups or classes (Group A, Group B and Group C) are authenticated by a digital s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 