A self-authorized cp-abe system and method
A CP-ABE and relationship technology, applied in the field of information security, can solve the problems of CP-ABE system privacy leakage, damage to the rights and interests of content applicants, leakage of content applicant attribute information, etc., and achieve the effect of avoiding privacy risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0141] The present invention will be further described in detail below in combination with specific implementations.
[0142] Retrofit example:
[0143] 1. Transformation of the algorithm of the document "John Bethencourt, Amit Sahai, and Brent Waters. Ciphertxt-Policy Attribute-Based Encryption. In IEEE Symposium on Security and Privacy, may2007, pp.321-334".
[0144] The modified algorithm is as follows:
[0145] (1) Establish:
[0146] Input: security parameter λ
[0147] Output: public parameters of the system, public and private keys of participants and other public / secret parameters.
[0148] Algorithm Description:
[0149] Establish the global public parameters of the system: establish an algorithm to generate (q, G, G T , e), where q is a prime order of λ bits, G and G T are two multiplicative cyclic groups of order q, and g is A generator on , e is A bilinear map on , the next step is to choose the hash function H: {0, 1} * →G.
[0150] Each participant i ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


