An Encryption Method Realizing the Key Isolation Property of Ciphertext Policy
A technology of isolating attributes and ciphertext strategy, applied in key distribution, it can solve the problem that key loss cannot be minimized, and achieve the effect of reducing loss and damage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] The present invention will be further elaborated below by describing a preferred specific embodiment in detail in conjunction with the accompanying drawings.
[0041] Such as figure 1 As shown, the present invention realizes the encryption method of the key isolation property of the ciphertext policy based on keyword search and bilinear pairing operation, including the following process:
[0042] Step S1, the cloud server initializes the parameters, the data owner inputs the security parameters, and the cloud server generates the system public key Pk and the system master key Mk;
[0043] Step S2, the data owner encrypts the keyword, and the data owner inputs the public key Pk and the keyword w to generate the ciphertext keyword cw;
[0044] Step S3, the data user inputs the system master key Mk and user attribute set N to the cloud server, and the cloud server generates the initial private key Sk of the data user;
[0045] Step S4, the data user enters the system mas...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


