ID-based broadcast encryption scheme containing customized information
A technology of broadcast encryption and identity information, applied in the field of cryptography and broadcast encryption scheme, can solve the problems of short public key length, large public key length, inability to meet personalized message transmission, etc., and achieve high efficiency and low bandwidth consumption. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] See image 3 The specific execution steps include the broadcast center setting system security parameters, generating the broadcast user set, identity space, generating the private key of each user in the set, the broadcast center encrypting the broadcast message and the personalized message for any user, and the recipient's decryption , The specific description is as follows:
[0027] (1) Set system parameters
[0028] (1.1) Suppose the system security parameter is k, p is a large prime number, and the broadcast user set is U={U 1 ,...,U n }, where n≥2. The identity information space is ID={0,1} n \{0 n }, where {0,1} n Represents a collection of n-bit long binary sequences, {0} n Represents a sequence of all 0s with a length of n bits. e means the source group is The target group is Of multilinear mapping, where All are cyclic multiplicative groups of order p. Represents a vector of length n+1 Represents a vector with length n+1 where the i+1 bit is 1, and the remai...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 