Use method, generation method and management system of identification private key
The embodiment of the invention provides a method for using an identification private key, and belongs to the technical field of computer security. The use method of the identification private key comprises the steps that private key parameters are sequentially acquired, a set of identification priv...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The embodiment of the invention provides a method for using an identification private key, and belongs to the technical field of computer security. The use method of the identification private key comprises the steps that private key parameters are sequentially acquired, a set of identification private keys is generated, and each identification private key in the set of identification private keys corresponds to one identification private key generation function identifier; and selecting one identification private key in the group of identification private keys for use, and disclosing the corresponding identification private key to generate a function identifier. A plurality of identification private keys are built in the user side, and the corresponding identification private keys are disclosed to generate the function identifiers, so that the identification private keys can be used and updated simply, safely and efficiently, the self-certification performance of the public keys cannot be reduced, and other |
---|