Public 密钥加密的软件许可方法
Software Licensing method with Public key Encryption
我正在研究一种许可软件分发的方法。
所有分发的 .exe 文件都有一个 public 键。
Public所有发行版的密钥都相同,用于加密许可信息并生成许可文件。
发行版将附带一个私钥(序列号),该私钥将用于 运行 软件。
所有发行版的私钥都不同。
任何人都可以建议任何可以使用单个 public 密钥加密的算法
并用不同的私钥解密。
Here 是 link ,我发现它与这个主题类似,但不知道如何实现。
如 Artjom 在您的 link 中所述;
Let's say multiple recipients have (a different) private key and all
of them can decrypt data encrypted with the same public key. You
should ask yourself, how can the different private keys be generated
to arrive at the same public key, but where all the recipients
wouldn't know the private key of each other.
实际上,他试图说,这种构造是不可能的。
并再次在您的 link Panco 中指出;问题;
I suspect you need to think more about the security goals (and
nongoals) of the system. The cluster head sends a message; who must be
able to read the message (e.g. the intended recipient)? Who must not
be able to read the message (e.g. random third parties)? Who don't you
care whether they can or cannot (e.g. the cluster head itself)? Also,
this is an ad hoc network; how do nodes join the cluster? Is there
some sort of introduction protocol (where keys can be exchanged)?
这是您的解决方案;
Depending on the answers, a purely symmetric system may be the Right
Thing.
我正在研究一种许可软件分发的方法。
所有分发的 .exe 文件都有一个 public 键。 Public所有发行版的密钥都相同,用于加密许可信息并生成许可文件。
发行版将附带一个私钥(序列号),该私钥将用于 运行 软件。 所有发行版的私钥都不同。
任何人都可以建议任何可以使用单个 public 密钥加密的算法 并用不同的私钥解密。
Here 是 link ,我发现它与这个主题类似,但不知道如何实现。
如 Artjom 在您的 link 中所述;
Let's say multiple recipients have (a different) private key and all of them can decrypt data encrypted with the same public key. You should ask yourself, how can the different private keys be generated to arrive at the same public key, but where all the recipients wouldn't know the private key of each other.
实际上,他试图说,这种构造是不可能的。
并再次在您的 link Panco 中指出;问题;
I suspect you need to think more about the security goals (and nongoals) of the system. The cluster head sends a message; who must be able to read the message (e.g. the intended recipient)? Who must not be able to read the message (e.g. random third parties)? Who don't you care whether they can or cannot (e.g. the cluster head itself)? Also, this is an ad hoc network; how do nodes join the cluster? Is there some sort of introduction protocol (where keys can be exchanged)?
这是您的解决方案;
Depending on the answers, a purely symmetric system may be the Right Thing.