File ownership proof method based on convergence encryption
A technology of convergent encryption and ownership, applied in the field of communication security, it can solve the problems that the protocol is no longer secure, increase the client computing overhead, etc., and achieve the effect of increasing the difficulty, reducing the computing overhead, and reducing the communication overhead.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] The present invention will be further described below in conjunction with the accompanying drawings.
[0026] refer to figure 1 , the implementation steps of the present invention are as follows:
[0027] Step 1, the key generation center KGC generates system parameters.
[0028] (1a) Set the safety parameter α≥160 of the system according to the actual requirements;
[0029] (1b) The key generation center KGC selects a value greater than 2 according to the security parameter α of the system α The prime number q of , construct the first multiplicative cyclic group G with q as order 1 , the second multiplicative cyclic group G 2 and the third multiplicative cyclic group G T , and make them satisfy from G 1 and G 2 Group to G T The bilinear mapping relation e of the group, that is, from the first multiplicative cyclic group G 1 Neutralize the second multiplicative cyclic group G 2 Take an element A and B as input respectively, then from the third multiplicative c...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com