A Ciphertext Policy-Based Attribute Encryption Method Realizing Instant User Attribute Revocation
A technology of user attributes and ciphertext policies, which is applied in the field of network and information security, can solve the problems of high revocation cost, inflexibility, and inability to realize fine-grained attribute revocation, and achieve the effect of reducing workload and burden
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0061] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment provides detailed implementation manners and implementation steps based on the technical solution, but is not limited to this embodiment.
[0062] Such as figure 1 As shown, the ciphertext-based policy attribute encryption method for realizing timely user attribute revocation mainly includes the following steps:
[0063] Step 1. The system is established, and the system public key and master key are generated;
[0064] Step 2. The encryptor constructs an access strategy;
[0065] Step 3. The encryptor encrypts the message and generates an initial ciphertext;
[0066] Step 4. The attribute authority center generates the user private key and the authorized private key;
[0067] Step 5. The cloud server constructs a binary tree of path keys;
[0068] Step 6, the cloud server performs proxy re-encryption, generates a re-cipher text, and realizes ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com