Identity method based on public key certificate
A technology of identity authentication and public key certificate, applied in user identity/authority verification, digital transmission system, electrical components, etc., can solve problems such as resource shortage, time-consuming, and unsatisfactory algorithms, and achieve the effect of fast computing speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0019] When the present invention is used for network communication to carry out identity authentication, suppose user A wants to carry out identity authentication to user B, proves to B that really is the main body that A claims, in this method, user A and user B share a system parameter (Z p , G, q, H), Z Here are examples where P is 512 bits and 1024 bits:
[0020] 512: P=0xED100D4D388990F60C7BD3C800D83355904433FF74E3BE0659D5C4E818239E600BD2D0DB7A5F42D2DAD99DF5DCC1014FD5B3F863D6632578230706C0A4CACCB7;
[0021] 1024:P=0xED8E7692CDA48EE01F012E58AA7F06FD6203393B17C392DF6970B4934D4F613A35EB9A64208D26CA148B12FF28D6B18EF427BEFCAC7780AFD95229E759177137261A6D939FB5465F72D16EB3E7ECE01232081F003A3938555D49328E4860FF4F77FD1BBDB3222E0D0D021619EAA5F81F4C98E92C595801B04C3C9E3A0E4C0A53;
[0022] Z p is a finite group generated modulo primes, G is Z p The subgroup whose order is q (p=2q+1, p, q are large prime numbers), H is G 3 → Anti-collision hash function of G, system parameters (Z ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com