Linked storage fine-grained access control model based on attribute encryption and timestamp
An access control and attribute encryption technology, which is applied in the field of cloud computing and communication security, can solve the problem of high computing cost and achieve the effect of reducing communication burden
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment is based on the technical solution and provides detailed implementation and specific operation process, but is not limited to this embodiment.
[0050] like Figure 1 to Figure 7 As shown, the present invention is a chain storage fine-grained access control model based on attribute encryption and time stamp, and the access control model includes the following steps:
[0051] First initialize, according to the traditional CP-ABE and DAC-MACS, the attribute authority (AA) generates the attribute private key (SK i ), and generate an attribute public key (PK i ). The authorization center (CA) generates a global public key (PK) and a global private key (SK) for each user.
[0052] S1 access users upload their own attribute private key SK i and the global public key PK to the authorization center;
[0053] The authorization center of ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com