Content security sharing method and system based on proxy re-encryption
A proxy re-encryption, content security technology, applied in the field of lightweight content security sharing based on proxy re-encryption, can solve the problem of inflexible access control, high algorithm complexity, and the original ciphertext does not have large-scale access control functions, etc. question
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] The present invention will be described in detail below with reference to specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that, for those skilled in the art, several changes and improvements can be made without departing from the inventive concept. These all belong to the protection scope of the present invention.
[0066] like figure 1 As shown, according to a kind of content security sharing method based on proxy re-encryption provided by the present invention, three types of entities: key server, user (including file owner, file recipient and shareee) and cloud server, according to the following steps accomplish:
[0067] Step 1) Initialization step: the key server determines the basic information of the system, initializes the system, generates the system public parameters and the system master key respectively, and s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


