Quadratic region code producing method and signature method
A technology for generating methods and sub-domains, applied in the fields of information security and cryptography, to achieve the effect of shortening the length, eliminating the necessity and improving the confidentiality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] Hereinafter, the present invention will be described in more detail with reference to the accompanying drawings.
[0025] (1) The concepts of secondary domains and groups
[0026] In order to introduce the secondary domain encryption system of the present invention, here at first introduce the basic concept of secondary domain and class (can refer to Hua Luogeng [14] ,Assume K = Q ( D ) is a quadratic field, where D is an integer without a square factor. reset
[0027] ω = σ - 1 + D σ ,
[0028] Then we know that the discriminant of K is Δ=(2 / σ) 2 d. If α, β∈K, use α to denote the conjugate of α in K, and use [α, β] to denote the module, namely
[0029] [α,β]={xα+yβ|x,y∈Z}=Zα+Zβ ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 