Revocable attribute base encryption method
An attribute-based encryption and attribute-based technology, which is applied to key distribution to ensure confidentiality, improve program efficiency, and achieve forward-backward security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0080] based on the following figure 1 , specifically explain the preferred embodiment of the present invention.
[0081] Such as figure 1 As shown, the present invention provides a reversible attribute-based encryption method, which comprises the following steps:
[0082] Step 1. System initialization: the trusted certification authority executes the Setup(k) algorithm, publishes the public key pk and saves the master key mk;
[0083] The trusted certification authority refers to an authority that can be fully trusted by users and is mainly responsible for generating master public keys and master keys for the system, and generating, distributing, revoking and updating attribute private keys for users;
[0084] Step 2. The trusted certification authority generates the user's private key: the trusted certification authority verifies the attributes of the user applying for registration, and generates a corresponding private key for each user through the KeyGen algorithm, and t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com