Operation method, device and server of modular exponentiation in public key cryptosystem
A technology of public key cryptosystem and operation method, which is applied in the field of equipment and servers, and the field of modular exponentiation method in public key cryptosystem, which can solve the problems that the privacy of cryptographic operations cannot be guaranteed.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0092] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.
[0093] Such as figure 1 Shown is a working flow chart of the modular exponentiation method in a public key cryptosystem of the present invention.
[0094] Step S101, constructing a random parameter w;
[0095] Step S102, selecting a random number k;
[0096] Step S103, performing a linear operation on w and k to obtain k'=Γ(k,w);
[0097] Step S104, send calculation g to the server k ′, where g is the generator in the public key cryptosystem, that is, the multiplicative group Z * p Elements of intermediate order q;
[0098] Step S105, obtain server calculation g k 'The calculation result Q';
[0099] Step S106, get Q w , the Q w =g w ;
[0100] Step S107, Q' and Q w Corresponding multiplication is performed according to the inverse operation of the linear operation to obtain Q, which is the result of the modular exponenti...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com