A Attribute Encryption Method with Equal Comparable Ciphertexts
A technology of attribute encryption and ciphertext, applied in the field of cloud storage management, can solve problems such as inconvenient storage structure, achieve the effect of ensuring security, reducing public key management and verification overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0023] see image 3 , the specific execution steps include the private key generation center setting system security parameters, key space, message space, and public parameters, and generating the public key in the attribute set. The specific description is as follows:
[0024] (1) System initialization
[0025] (1.1) Let the system security parameter be λ, p be a large prime number, G 1 Represents a cyclic additive group of order p, g∈G 1 means G 1 generator, G 2 Represents a cyclic multiplicative group of order p. e represents the bilinear map G 1 ×G 1 →G 2 . Define a safe Hash function H, H means from G 2 map to G 1 A secure hash function for U elements h representing user attributes 1 ,h 2 … h u ∈G 1 . The user private key key space is K∈G 1 , the encrypted message space is M space ∈G 1 . Denotes a finite field Z p ={0,1,...,p-1 is the set obtained by removing zero elements.
[0026] (1.2) The private key generation center randomly selects a, Calcul...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 



