Multi-user supported searchable encryption system and method
An encryption system, multi-user technology, applied in the field of network information security, can solve the problems of wasting resources, consuming a lot of time and bandwidth, and achieving the effects of improving security, saving matching time, and improving retrieval efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] The present invention will be described in further detail below in conjunction with the accompanying drawings.
[0047] refer to figure 1 , a searchable encryption system supporting multiple users of the present invention includes a trusted authority center TA, service providers and users. in:
[0048] The trusted authorization center TA is composed of a system initialization module, a key generation and management module, and a user information management module: the system initialization module is used to initialize the system, generate public parameters and master keys for the system, and public parameters are disclosed and sent to the encryption key. The key generation and management module, the master key is stored confidentially by the system initialization module; the key generation and management module is used to manage the user's attribute private key, query key and supplementary key in the system, and store the attribute private key and query key Distribute...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com