Attribute-based encryption method preventing key colony and key abuse
An attribute encryption and attribute technology, applied in the public key and key distribution of secure communication, which can solve the problems of message plaintext leakage, key cloning key abuse, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment
[0040] A specific embodiment of the present invention is an attribute-based encryption method against key cloning and key abuse, and its specific operation steps are:
[0041] A. System initialization
[0042] A1. The attribute set in the system is recorded as P, and the number of all attributes in the attribute set P is K×N. All attributes are numbered from 1, and the elements contained in the attribute set P are the elements corresponding to specific attributes. Numerical number; the system includes a central authority CAP and K attribute authority centers AA k and an identity authorization center IA; the system divides the attribute set P into K attribute subsets P 1 ,P 2 ,…P k ...,P K , each attribute subset P k Including N attributes, P k ={p k,1 ,p k,2 ,...p k,n ...,p k,N}, where p k,n is the kth attribute subset P k The nth element in , whose value is (k-1)N+n; the system will subset the kth attribute P k The N attributes of are assigned to the kth attribut...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com