Book resource access control method based on ciphertext attribute authentication and threshold function
A resource access and control method technology, which is applied in the field of book resource access control based on ciphertext attribute authentication and threshold function, can solve the problems of reducing computing and communication overhead, easily revealing personal identity information, and high information sensitivity, so as to reduce computing and communication overhead, the effect of avoiding collusion attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0062] Example 1
[0063] In the case of complex information sharing, the authentication center in the domain needs to authenticate the information sharing members, but when providing identity information, the identity information is easy to leak or be stolen. For security reasons, while sharing information with multiple parties, it is necessary to protect personal identity privacy. When information is shared, the confidentiality, integrity, and anti-leakage of communication information must also be guaranteed, and only authorized members can share information. In view of this application background, the present invention proposes a book resource access control method based on ciphertext attribute authentication and threshold function, such as figure 1 As shown, the steps are as follows: ①The terminal members participating in the sharing of information resources first perform parameter initialization, and generate their own public / private key pairs respectively; ②The terminal me...
Example Embodiment
[0089] Example 2
[0090] A method for access control of book resources based on ciphertext attribute authentication and threshold function, such as figure 1 As shown, in order to illustrate the content and implementation method of the present invention, a specific embodiment is given. In this embodiment, for the convenience of examples, the number of terminal members participating in information resource sharing is at most 10, and the entity set of terminal members is expressed as The set of corresponding entity terminal membership is expressed as The certification center CA defines the attribute set of all terminal members as Attr={A 1 ,A 2 }, terminal member u i The attribute set of (1≤i≤10) is attr i ={a i,1 ,a i,2 ,a i,3 }. The purpose of introducing details in this embodiment is not to limit the scope of the claims, but to help understand the implementation method of the present invention. Those skilled in the art should understand that various modifications, changes or ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap