A multi-user searchable encryption method and encryption system in the Internet of Vehicles environment
An encryption method, multi-user technology
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0110] Such as figure 2 As shown, the multi-user searchable encryption method in the Internet of Vehicles environment provided by the embodiment of the present invention (the multi-user searchable encryption method based on edge intelligence in the Internet of Vehicles environment) specifically includes the following steps:
[0111] Step 1: Domain A trusted authority center TA is initialized.
[0112] 1.1) TA creates a group G whose generator is g and order is p, where p is a prime number. Simultaneously define the bilinear map e:G×G→G T . Randomly choose h 1 ∈G,α∈Z p and calculate g 1 =g α . Set up three hash functions H 1 (·),H 2 (·),H 3 ( ) and two random functions R 1 (×), R 2 (·). TA will give the public parameters in the system pp=(g,g 1 ,h 1 ), msk=α.
[0113] 1.2) TA randomly generates a private key and calculate the public key TA will public-private key pair (SK E , PK E ), (SK DO , PK DO ) are distributed to ES and DO respectively, and the pu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com