Strategy control signature method supporting privacy protection
A technology of policy control and privacy protection, applied to the public key and key distribution of secure communication, which can solve the problems of access policy hiding and achieve the effect of solving privacy protection problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.
[0022] In order to integrate the above-mentioned advantages of attribute-based signature, policy-based signature and policy hiding technology, the present invention firstly forms an LSSS-based policy control signature based on Chen Weidan's LSSS-based hidden policy attribute-based encryption scheme and policy control signature, and introduces a hidden The idea of access policy finally proposes a policy-controlled signature method that supports privacy protection, which meets three requirements: first, the signer formulates an access policy and attaches it to...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com