User identity encryption method based on composite number order group
A technology of user identity and encryption method, which is applied in the field of user identity encryption based on composite order groups, can solve problems such as unsatisfactory application scenarios, and achieve high security and privacy guarantee effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.
[0052] figure 1 It is a schematic flow diagram of user identity encryption based on composite order groups in the present invention.
[0053] See figure 1 , the user identity encryption method based on composite number order group provided by the present invention, comprises the following steps:
[0054] (1) Initialization: The key generation center generates composite order groups, and generates public parameters and master keys according to security parameters.
[0055] (2) Key generation stage: the key generation center generates the user's private key related to the user's identity according to the public parameters, the master key and the user's identity.
[0056] (3) Encryption stage: The data sender encrypts the plaintext according to the public parameters and the identity of the receiver, and outputs the corresponding ciphertext.
[0057] (4...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com