Short ciphertext identity-based encryption method satisfying forward security
A forward security, short ciphertext technology, applied in the field of short ciphertext identity base encryption, which can solve the problems of unobtainable and unbreakable ciphertext messages.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] The short ciphertext identity-based encryption method that satisfies forward security will be described in detail below in conjunction with the accompanying drawings. The present invention is divided into 6 steps, that is, the initialization of the private key generation mechanism, the registration and authentication of the user, the generation and distribution of the initial private key, the update of the private key, encryption and decryption, see figure 1 , the specific steps of the method are as follows:
[0058] Step 1: The private key generation mechanism is initialized. The private key generation agency first specifies the total number of time slices of the system as N, and then selects two compound factorial cyclic groups G according to the system security parameter k 0 and G 1 (the order of which satisfies q=p 1 p 2 p 3 , and p 1 ,p 2 ,p 3 are three different large prime numbers, and the subgroups of G are ), and there is a symmetric bilinear map e on...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com