摘要 |
<p>The method involves encrypting a public key using a public key encryption schema based on identity-based encryption identity. Memory capacity required by an electronic device for encrypting the public key is reduced, where the public key encryption schema is a Gentry identity-based encryption type schema and Cramer-Shoup traditional public key encryption type schema. Encryption and signing of messages is performed by encrypting the public key. An independent claim is also included for a secured device for encrypting a public key.</p> |