Security-enhanced connection keyword search method based on public key encryption
A technology of keyword search and public key encryption, which is applied to the public key of secure communication, secure communication device, and key distribution. question
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] In order to make the purpose, content and advantages of the present invention clearer, the specific embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.
[0036] The core idea of the specific structure of the SCF-PECKS scheme of the present invention comes from the IBE scheme proposed by Water [1]. In order to realize the receiver anonymity of the scheme, the present invention uses the characteristics of the asymmetric bidirectional group to improve the scheme, and based on the The anonymous IBE scheme further constructs a SCF-PECKS scheme, which has achieved better results in terms of functionality, performance and security.
[0037] as attached figure 1 and figure 2 As shown, the scheme mainly includes four components: key management authority, data owner, data visitor and search server, in which the key management authority is responsible for generating global parameters, search server key and...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com