Cryptosystem, cryptographic communication method, encryption device, key-generating device, decryption device, content server device, program, and recording medium
A technology of key generation device and cryptographic system, which is applied to secure communication devices, public keys for secure communications, and key distribution, which can solve problems such as inability to encrypt
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0190]
[0191] In recent years, extended ciphers of ID-based ciphers called functional ciphers have become a topic. Functional encryption consists of the following four algorithms (Setup, KeyGen, Enc, Dec). The outline of the protocol is as follows.
[0192] "Protocol FE"
[0193] · Setup(1 λ )→(pk,sk): setting algorithm
[0194] With security parameter 1 λ As input, a probabilistic polynomial-time algorithm that outputs the public parameters pk and the master key sk
[0195] ·KeyGen(sk,i)→sk i : key generation algorithm
[0196] Take the master key sk and the key identifier i as input, and output the secret key sk corresponding to the key identifier i i The probabilistic polynomial-time algorithm for
[0197] Enc(pk,j,x)→c j :Encryption Algorithm
[0198] Take the public parameter pk, the receiver identifier j and the information (plaintext) x of the encrypted object as input, and output the ciphertext c j The probabilistic polynomial-time algorithm for
[0199...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com