Digital signature method based on super logarithm difficult problem, and dual coresidual theorem
A digital signature and super-logarithmic technology, applied in data processing applications, user identity/authority verification, business, etc., can solve problems such as weakening security strength
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0084] The characteristic of the public-key digital signature method based on the super-logarithm problem and the double congruence theorem is that it allows each user to obtain two keys, one key can be made public, and one key can only be privately owned. In this way, there is no need to worry about the secret key being leaked during the transfer process. When the correspondent is agreed to transmit information on the Internet, the sender uses his own private key to digitally sign the file or message, and the receiver uses the sender's public key to verify it after receiving the file and signature code.
[0085] Each user can obtain two keys from the designated CA (Certificate Authentication) certification center. CA certification center is an institution that registers users and generates, distributes and manages keys. It uses the key generation method in Section 3.2.2 to generate the user's public key and private key.
[0086] This digital signature method can be realized...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com