Attribute-Based Encryption Method for Central Authority-Free Ciphertext Policy with Privacy Preservation
A technology of attribute-based encryption and central organization, applied in the field of attribute-based encryption of ciphertext policy, it can solve the problems that the central organization cannot join or leave the system, leak user identity information, and only consider the privacy of user global identifiers.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] The present invention will be further described below in conjunction with the accompanying drawings.
[0026] An attribute-based encryption method with a privacy-preserving ciphertext policy without a central authority, which includes the following five stages:
[0027] (1) Initialization stage: Assume that there are N central agencies in the system {A 1 ,A 2 ,...,A N}. For i ∈ {1,2,…,N}, each central authority A i Manage a set of properties Apply the bilinear group generation algorithm GG(1 k )→(e,p,G,G τ ). Suppose g, η and h are the generators of the cyclic group G. The public parameters of the system are params=(e,p,g,h,η,G,G τ ). Among them, p is a prime number, Z p is a finite field modulo p, a i,j ∈ Z p . Algorithm GG(1 k ) Enter a security parameter 1 k , output a bilinear group of order p (e,G,G τ ) satisfies e:G×G→G τ .
[0028] (2) Central organization establishment stage: For i∈{1,2,…,N}, central organization A i calculate for calc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


