Ciphertext-policy attribute-based encryption method having efficient user revocation capability
A technology of attribute-based encryption and ciphertext strategy, which is applied in the field of information security and can solve problems such as expensive computing costs and security issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific embodiments.
[0053] One, the applied mathematical theory of the present invention explains:
[0054] 1. Bilinear pairing
[0055] In the present invention, the bilinear pair e: G×G→G T is a mapping that satisfies bilinearity, non-degenerateness, and computability, and it maps two elements in the prime order group G to the prime order group G T an element in .
[0056] 2. Lagrange coefficient
[0057] For d-1 degree polynomial f(x) and set S={x 1 ,x 2 ,...,x d}, element x i The Lagrangian coefficient corresponding to the set S is From the Lagrangian coefficients, the polynomial f(x) can be calculated as follows:
[0058] f(x)=Σ i∈S Δ i,S f(x i )
[0059] Among them, the Lagrange coefficient Δ i,S is a polynomial in the independent variable x.
...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com