Public key encryption method based on cells
A public key encryption and public key technology, applied in key distribution, can solve problems such as mathematical difficulties
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0060] In order to further illustrate the technical solution of the present invention, the public key encryption method of the present invention will be further described in detail below in conjunction with specific examples.
[0061] The present invention at first provides the definition of some basic symbols as follows:
[0062] 1) represents a collection of integers, that is, Represents the set of residual classes modulo q, namely where q is a positive integer; for any positive integer n, means n direct product of
[0063] 2) Represents a set of real numbers; Represents the set composed of positive real numbers; Represents a set of positive integers, that is,
[0064] 3) order is a positive integer, R q is defined in The degree of polynomial ring on is n-1; when n=1, define for any positive integer means k R q direct product of for any positive integer expressed in R q A set of k×k matrices composed of elements in ;
[0065] 4) For ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com