Outsourced computing method, device and server in public key cryptosystem
A public key cryptography system and computing method technology, applied in the field of equipment and servers, outsourcing computing methods, and can solve problems such as the inability to guarantee computing privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0147] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.
[0148] Such as figure 1 Shown is a working flow chart of the outsourcing calculation method in a public key cryptosystem of the present invention.
[0149] Step S101, constructing a random parameter w;
[0150] Step S102, selecting a random number k;
[0151] Step S103, performing a linear operation on w and k to obtain k';
[0152] Step S104, sending a request to the server to perform a first operation on k' and G, where G is a generator in the public key cryptosystem;
[0153] Step S105, obtaining the calculation result Q' of the first operation performed by the server on k' and G;
[0154] Step S106, perform the first operation on w and G, and obtain the calculation result Q of the first operation on w and G w ;
[0155] Step S107, Q' and Q w Carry out the second operation to get Q′ and Q w The calculation result Q of the s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com