An Attribute-Based Outsourcing Scheme for Bgn-type Ciphertext Decryption
A technology of ciphertext and attributes, which is applied in the field of information security and can solve problems such as illegal reading of ciphertext
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0107] Example 1: Attribute-based BGN-type ciphertext decryption outsourcing scheme
[0108] Such as figure 1 The specific steps of the attribute-based BGN type ciphertext decryption outsourcing scheme shown are as follows:
[0109] Step (1): Set system parameters, generate encryption key, master key MSK and public key PK, the specific process of step (1) is as follows:
[0110] Step (1-1): Set system parameters, input security parameter λ and attribute space U, where U={0,1} * ; The value of the input security parameter λ is relatively large. In this embodiment, λ is selected as 1024bit, which is sufficient to ensure the security of the scheme.
[0111] Step (1-2): Run the algorithm ξ(λ) to get the tuple (q 1 ,q 2 , G, G 1 , e) and the bilinear map e:G×G→G 1 , where q 1 ,q 2 is a prime number, G, G 1 Both are of order n=q 1 q 2 group of ; ξ(λ) is a public parameter generation algorithm, q 1 ,q 2 is a large prime number, select q in this embodiment 1 ,q 2 It is ...
Embodiment 2
[0141] Example 2: Attribute-based BGN-type ciphertext decryption outsourcing scheme
[0142] The specific plan is as follows:
[0143] Step (1): Set system parameters, generate encryption key, master key MSK and public key PK, the specific process of step (1) is as follows:
[0144] Step (1-1): Set system parameters, input security parameter λ and attribute space U, where U={0,1} * ; The value of the input security parameter λ is relatively large. In this embodiment, λ is selected as 1024bit, which is sufficient to ensure the security of the scheme.
[0145] Step (1-2): Run the algorithm ξ(λ) to get the tuple (q 1 ,q 2 ,G,G 1 , e) and bilinear map e:G×G→G 1 , where q 1 ,q 2 is a prime number, G, G 1 Both are of order n=q 1 q 2 group of ; ξ(λ) is a public parameter generation algorithm, q 1 ,q 2 is a large prime number, select q in this embodiment 1 ,q 2 It is a prime number of 512bit size.
[0146] Step (1-3): Randomly select generators k, u in the group G, and ...
Embodiment 3
[0185] Example 3: Attribute-based BGN-type ciphertext decryption outsourcing scheme
[0186] The specific plan is as follows:
[0187] Step (1): Set system parameters, generate encryption key, master key MSK and public key PK, the specific process of step (1) is as follows:
[0188] Step (1-1): Set system parameters, input security parameter λ and attribute space U, where U={0,1} * ; The value of the input security parameter λ is relatively large. In this embodiment, λ is selected as 1024bit, which is sufficient to ensure the security of the scheme.
[0189] Step (1-2): Run the algorithm ξ(λ) to get the tuple (q 1 ,q 2 ,G,G 1 , e) and bilinear map e:G×G→G 1 , where q 1 ,q 2 is a prime number, G, G 1 Both are of order n=q 1 q 2 group of ; ξ(λ) is a public parameter generation algorithm, q 1 ,q 2 is a large prime number, select q in this embodiment 1 ,q 2 It is a prime number of 512bit size.
[0190] Step (1-3): Randomly select generators k, u in the group G, and ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com