Identity method based on public key certificate
A technology of identity authentication and public key certificate, applied in user identity/authority verification, digital transmission system, electrical components, etc., can solve the problems of resource shortage, unsatisfactory algorithm, time-consuming, etc., and achieve the effect of fast computing speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0019] When the present invention is used for network communication to carry out identity authentication, suppose user A wants to carry out identity authentication to user B, proves to B that really is the main body that A claims, in this method, user A and user B share a system parameter (Z p , G, q, H), here are examples where P is 512 bits and 1024 bits:
[0020] 512: P=0xED100D4D388990F60C7BD3C800D83355904433FF74E3BE0659D5C4E818239E600BD2D0DB7A5F42D2DAD99DF5DCC1014FD5B3F863D6632578230706C0A4CACCB7
[0021] 1024:P=0xED8E7692CDA48EE01F012E58AA7F06FD6203393B17C392DF6970B4934D4F613A35EB9A64208D26CA148B12FF28D6B18EF427BEFCAC7780AFD95229E759177137261A6D939FB5465F72D16EB3E7ECE01232081F003A3938555D49328E4860FF4F77FD1BBDB3222E0D0D021619EAA5F81F4C98E92C595801B04C3C9E3A0E4C0A53假设用户A需向用户B进行身份认证,用户A的私钥为(w,x 1 , x 2 ), the public key is (g, h, v, c), then the steps for user A to authenticate with user B are as follows: (a) User A randomly selects r∈Z q ,calculate u ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com