METHOD OF GENERATING COMPOUND TYPE COMBINED PUBLIC KEY
First Claim
1. A method of generating a compound type combined public key, including the following steps:
- a) a key management center KMC generating an identity private-key isk based on a combining matrix and an entity identity;
b) the key management center KMC defining a system private-key ssk for each entity,c) the key management center KMC combining the identity private-key isk and the system private-key ssk to generate a first-order combined private-key csk′
;
d) the key management center KMC calculating a system public key SPK corresponding to the system private key ssk;
e) the key management center KMC writing the first-order combined private-key csk′
into a ID certificate;
f) a relying party combining an identity public key IPK and the system public key SPK to generate a first-order combined public key CPK'"'"';
g) a user self-defining an updating private key usk and an updating public key UPK;
h) the user combining the first-order combined private key csk′ and
the updating private key usk to generate a second-order combined private key csk″
;
i) the user combining the system public key SPK and the updating public key UPK to generate an accompanying public key APK; and
j) the user combining the identity public key IPK and the accompanying public key APK to generate a second-order combined public key CPK″
.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention constructs a compound type combined public key system on the basis of a combined public key CPK system. The combined key is combined by an identity key and a randomly defined key. The randomly defined key can be defined by a center, called a system key; and can be self-defined, called updating key. Combination of the identity key and the system key generates a first-order combined key. The first-order combined key is then combined with the updating key to generate a second-order combined key. The first-order combined key can be used for centralized digital signature and key exchange. The second-order combined key can be used for distributed digital signature, to provide individual with convenient key exchange and absolute privacy. A combining matrix, as a trust root, provides proof of integrity of identity and key, with no need of third party proof. The present invention can be widely used in fields such as trusted connecting (communication), code authentication (software), e-bank (note), trusted transaction, trusted logistics, and network management.
-
Citations
19 Claims
-
1. A method of generating a compound type combined public key, including the following steps:
-
a) a key management center KMC generating an identity private-key isk based on a combining matrix and an entity identity; b) the key management center KMC defining a system private-key ssk for each entity, c) the key management center KMC combining the identity private-key isk and the system private-key ssk to generate a first-order combined private-key csk′
;d) the key management center KMC calculating a system public key SPK corresponding to the system private key ssk; e) the key management center KMC writing the first-order combined private-key csk′
into a ID certificate;f) a relying party combining an identity public key IPK and the system public key SPK to generate a first-order combined public key CPK'"'"'; g) a user self-defining an updating private key usk and an updating public key UPK; h) the user combining the first-order combined private key csk′ and
the updating private key usk to generate a second-order combined private key csk″
;i) the user combining the system public key SPK and the updating public key UPK to generate an accompanying public key APK; and j) the user combining the identity public key IPK and the accompanying public key APK to generate a second-order combined public key CPK″
. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification