CP-ABE method for generating security decryption secret key
A CP-ABE and decryption key technology, which is applied to secure communication devices and key distribution, can solve problems such as not supporting outsourced decryption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0077] The present invention is described in further detail below in conjunction with specific examples.
[0078] Method of the present invention is to the transformation process of CP-ABE algorithm:
[0079] For the CP-ABE algorithm that meets the following conditions, the SK-CP-ABE algorithm can transform this algorithm to form a new algorithm: There is no description of outsourcing decryption in this CP-ABE algorithm.
[0080] For the CP-ABE algorithm that satisfies the above conditions The general process of transformation is described as follows (only the modified part is described):
[0081] 1. Establish
[0082] Input: Security parameter λ.
[0083] Output: public parameters of the system, public and private keys of the content requester, public / secret parameters of the authorizer.
[0084] In the original CP-ABE algorithm, among the global parameters, is a multiplicative cyclic group based on elliptic curves with order p and generator g. CP-ABE Algorithm Amon...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 