Searchable public key encryption method
A public key encryption, public key technology, applied in the field of searchable public key encryption, can solve problems such as the difficulty of circular privacy DLP
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0034] The present invention will be further described in detail below through specific embodiments:
[0035] The searchable public key encryption method of the present invention specifically includes the following steps:
[0036] (1) The data owner, receiver and cloud server respectively initialize the operating environment, specifically:
[0037] The data owner, receiver and cloud server run the initialization algorithm respectively, the initialization algorithm is GlobalSetup(λ), GlobalSetup(λ) is:
[0038] After entering the safety parameter λ, GlobalSetup(λ) outputs a global parameter GP={G,G 1 ,e,H 1 ,H 2 ,g,q}; where e is a bilinear mapping, G and G 1 Is the multiplicative cyclic group of prime q; e: G×G→G 1 Is an admissible bilinear map; H 1 And H 2 Are two hash functions, and H 1 And H 2 Treated as two random fable machines, and H 1 :{0,1} * →G, H 2 :G→{0,1} λ (Where λ is a safety parameter), g is a generator of group G.
[0039] (2) The owner of the data first defines a recei...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap