Verifiable attribute-based encryption outsourcing scheme supporting attribute hiding
An attribute-based encryption and attribute technology, applied in the field of cloud computing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] The invention consists of three steps: initialization, encryption, and decryption. The specific implementation process of the three steps is as follows.
[0023] Symbol introduction.
[0024] 1)H(·)-{0,1} * →G N : Hash function in cryptography, G N Is a cyclic multiplication group.
[0025] 2) H 1 (·)-G 1 →{0, 1} logN : Hash function in cryptography, G 1 Is a cyclic multiplication group.
[0026] 3) The hash function in cryptography, Is a cyclic group of order p.
[0027] 4) Key derivation function in cryptography.
[0028] First define a bilinear mapping, G N And G 1 Is the cyclic multiplicative group of order given composite number N=pqr, p, q, r are different prime numbers, G p And G r G N Subgroup of, let g p And g r Separate its living members, e: G N ×G N →G 1 .
[0029] 1. Initialization.
[0030] 1) Run Setup by DO (1 κ )→(PK, MK) function to generate the public key and master key of the system: first select two random numbers: And calculate And e(g p , G p ) α ; Sele...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 