Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Outsourced computing method, device and server in public key cryptosystem

A public key cryptography system and computing method technology, applied in the field of equipment and servers, outsourcing computing methods, and can solve problems such as the inability to guarantee computing privacy

Active Publication Date: 2016-10-05
GUANGDONG CERTIFICATE AUTHORITY
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0030] Based on this, it is necessary to provide an outsourcing computing method, equipment and server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Outsourced computing method, device and server in public key cryptosystem
  • Outsourced computing method, device and server in public key cryptosystem
  • Outsourced computing method, device and server in public key cryptosystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0147] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0148] Such as figure 1 Shown is a working flow chart of the outsourcing calculation method in a public key cryptosystem of the present invention.

[0149] Step S101, constructing a random parameter w;

[0150] Step S102, selecting a random number k;

[0151] Step S103, performing a linear operation on w and k to obtain k';

[0152] Step S104, sending a request to the server to perform a first operation on k' and G, where G is a generator in the public key cryptosystem;

[0153] Step S105, obtaining the calculation result Q' of the first operation performed by the server on k' and G;

[0154] Step S106, perform the first operation on w and G, and obtain the calculation result Q of the first operation on w and G w ;

[0155] Step S107, Q' and Q w Carry out the second operation to get Q′ and Q w The calculation result Q of the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to cryptology relative technical field, in particular to outsourcing calculation method, device and server of a public key system. The outsourcing calculation method comprises the following steps: constructing random parameter w; choosing random number k; conducting linear operation on w and k to obtain k'; sending request of conducting a first operation on k' and G to a server, wherein G is a generating element of the public key system; obtaining calculation result Q' of the first operation of k' and G by the server; conducting the first operation on w and G to obtain the calculation result Q w of the first operation of w and G; conducting a second operation on Q' and Q w to obtain the calculation Q of the second operation of Q' and Q w. On the condition of meeting digital signature safety, the goal of safely delivering complicated calculation of the public key system in an outsourcing calculation manner to cloud computing service providers can be achieved.

Description

technical field [0001] The invention relates to the technical field related to cryptography, in particular to an outsourced computing method, device and server in a public key cryptosystem. Background technique [0002] Elliptic Curve Cryptosystem (ECC), as a public key cryptosystem, its basic principle is to perform point multiplication on a predefined elliptic curve Among them, the point G is a fixed parameter, and k is a large number generated randomly. In order to ensure the security of the digital signature algorithm itself, k is required to be a real physical random number. The point multiplication operation Q=kG can be decomposed into basic operations such as point addition, point doubling, and modular multiplication. These basic operations are all based on the finite field F p on the basis of mathematics. [0003] Finite field F p The elliptic curve equation on can exist in many forms, among which the typical elliptic curve equation has the shape of y 2 =x 3 +...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L29/08
Inventor 张永强刘镪梁文晖
Owner GUANGDONG CERTIFICATE AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products