Hello guys I am trying to implement Certificateless Cryptography algorithm with reference to this base paper. Right now I am trying to implement the code in java. There are some points specified in PDF which I didn't understood. I need some help to understand how should I implement them.
The points are as follows (kindly correct me if I misunderstood any point):
- Pick a generator of $g$ of $Z_p^*$ with order $q$. -> for this step I just followed this link as reference and calculated $g$ as $g^{(p−1)/2}\bmod p=1$ where $g$ is prime number.
- Choose cryptographic hash in the paper they have specified that they had used SHA-1 to generate hash. I can generate the hash values but I am not able to reproduce the hash functions given in base paper, does $(0,1)^*$ is used to represent binary.
- Hash usually generates hexadecimal values do I need to convert them into decimal for Raise operation i.e. power
- Does the hash needs to be of fixed size or not.
- Sorry to say but in summary I didn't understood the encryption part of this paper. I know stackexchange is not made to explain how it works but I just want a proper guide line so that I can implement the application.