Multi-receiver identity anonymity signcryption method
A multi-receiver, receiver technology, applied in the network field, can solve the problem of user identity anonymity that cannot be realized in communication sessions
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0069] Attached below figure 1 The present invention is further described.
[0070] Step 1, generate cryptographic system parameters.
[0071] The key generation center selects a large prime number q according to the security parameter z of the cryptographic system, where z64 And q>2 z , to construct two additive cyclic groups G of order q 1 and the multiplicative cyclic group G 2 ;The key generation center maps the additive cyclic group to the multiplicative cyclic group, and obtains a bilinear map, namely e:G 1 ×G 1 →G 2 , from the additive cyclic group G 1 Randomly select the generator P; randomly select the master key of the cryptosystem from the additive cyclic group The result of multiplying the generator of the additive cyclic group and the master key of the cryptosystem is used as the public key P of the cryptosystem pub =sP, save the cryptosystem master key s; the key generation center respectively constructs the identity hash function H 1 : {0,1} * →G 1 ;...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com