Provably secure attribute-based online/offline encryption method
An encryption method and off-line key technology, applied in the construction field of ABOOE
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] 1. First introduce the definition of the basic knowledge related to the method of the present invention, mainly including
[0017] Symmetric bilinear pair definition: let and is a multiplicative cyclic group of order large prime p, g is The generator of , if there is a mapping e: The following conditions are met: (1) Bilinear: For e(u a ,v b )=e(u,v) ab ; (2) non-degenerate: e(g, g)≠1; (3) computability: There are efficient algorithms to compute e(u,v) in polynomial time; then the above map e is called a symmetric bilinear pair.
[0018] l-DBDHI Hypothetical Definition: The l-DBDHI problem is in The above is defined as: randomly select α∈Z p * , g is The generator of , given a (l+2) tuple Determine whether the value of T is e(g,g) 1 / α . If for any probabilistic polynomial time (PPT) algorithm exist The advantages of solving the l-DBDHI problem above are negligible, then the l-DBDHI hypothesis is above is established.
[0019] l-BDHI Hyp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


