Encryption method for multiple authorization centers
An encryption method and authorizer's technology, applied in the field of information security, can solve the problems of reduced calculation cost and communication cost in the decryption stage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] Below in conjunction with accompanying drawing, the encryption method of a kind of multi-authorization center that the present invention proposes is described in detail: the mathematical theory used in the present invention illustrates:
[0046] 1. Bilinear Pairing
[0047] Here is a brief introduction to the basic definition of a bilinear map and the properties it needs to satisfy.
[0048] Order G 0 ,G 1 are two multiplicative cyclic groups of order p, where p is a prime number and g is G 0 generator of . Define the bilinear map on two groups as: e:G 0 ×G 0 →G 1 , and satisfy the following properties:
[0049] (1) Dual mapping: e(g a , h b )=e(g,h) ab , for all are established.
[0050] (2) Non-degenerate: e(g,g)≠1.
[0051] (3) Computability: There exists an efficient algorithm to compute e.
[0052] 2. Assumption of BDH (Decisional Bilinear Diffie-Hellman) difficult problem
[0053] Given a cyclic group G of order p 0 , where p is a prime number and...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com