Identity-based anonymous broadcast encryption method under prime order in standard model
A standard model, broadcast encryption technology, applied to digital transmission systems and key distribution, can solve problems such as low efficiency, no security proof, and low efficiency of Freeman technology, and achieve the effect of protecting privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0031] Step 1, the system is established:
[0032] 1) Input the security parameter λ, the number of receivers m and the bilinear pairing e:G 1 ×G 2 →G T ;
[0033] 2) The key generation center PKG randomly selects the biorthogonal basis (D, D * ), d 1 ,···,d 4 represents an element in D, means D * elements in
[0034] 3) The key generation center PKG randomly selects α∈Z q , the output system parameter is The master key is
[0035] Step 2, extract the user private key:
[0036] 1) Enter the identity ID i ∈S, S={ID 1 ,···,ID n};
[0037] 2) The key generation center PKG is randomly selected then the private key is
[0038] Step three, encryption:
[0039] 1) Input message M;
[0040] 2) The key generation center PKG randomly selects z∈Z q , then the ciphertext is
[0041] Step 4, decryption:
[0042] When the receiver receives the ciphertext CT={C 1 ,C 2}, perform the following steps:
[0043] 1) If ID i ∈S, with the private key To decrypt t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 