Private key fixed-length ciphertext-policy attribute-based encryption method
A technology of attribute-based encryption and ciphertext strategy, applied in the field of information security, can solve problems such as poor expression ability and expression efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0076] A ciphertext policy attribute-based encryption method with a fixed-length private key, and a schematic diagram of the overall framework of the CP-ABE scheme designed with ROBDD as the access structure. figure 1 As shown, there are four entities in total: the data encryption party, that is, the data owner; the data decryption party, that is, the data user; the authorization center; and the cloud storage server. The encryption method mainly includes the following four basic algorithms:
[0077] 1) Setup algorithm, executed by the authorization center, mainly performs the following operations: select a bilinear group G with order p 0 , with a generator g, the two-line row mapping is denoted as e:G 0 ×G 0 →G 1 ; Choose Z randomly p elements in y,t 0 ,t 1 ,...,t n-1 ,t 0 ',t 1 ',...,t n-1 '. make Further generate the system public key and master key
[0078] 2) Encrypt (PK, M, ROBDD) algorithm, executed by the data owner, mainly completes the data encryption...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com