Attribute protection based multiple authorization center encryption method
An encryption method and authorization center technology, applied in the field of information security, can solve problems such as leakage of user privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0067] Below in conjunction with accompanying drawing, a kind of multi-authorization center encryption method based on attribute protection that the present invention proposes is described in detail:
[0068] The mathematical theory used in the present invention illustrates:
[0069] 1. Bilinear Pairing
[0070] Here is a brief introduction to the basic definition of a bilinear map and the properties it needs to satisfy.
[0071] Order G 0 ,G 1 are two multiplicative cyclic groups of order p, where p is a prime number and g is G 0 generator of . Define the bilinear map on two groups as: e:G 0 ×G 0 →G 1 , and satisfy the following properties:
[0072] (1) Dual mapping: e(g a ,h b )=e(g,h) ab , for all g, h∈G 0 ,a, are established.
[0073] (2) Non-degenerate: e(g,g)≠1.
[0074] (3) Computability: There exists an efficient algorithm to compute e.
[0075] 2. Assumption of BDH (Decisional Bilinear Diffie-Hellman) difficult problem
[0076] Given a cyclic group G...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com