Friend recommendation system and method based on hidden strategy attribute base encryption
An attribute-based encryption and friend recommendation technology, which is applied in the field of social network privacy protection, can solve data privacy leakage and other problems, and achieve the effect of reducing decryption costs and information encryption costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] The purpose of this embodiment is to provide a friend recommendation system based on hidden policy attribute base encryption.
[0040] A friend recommendation system based on hidden policy attribute base encryption, comprising:
[0041] A trusted center, configured to provide registration services to publishers and requesters, and to perform key distribution;
[0042] The matching server is configured to receive and store the publisher's self-described ciphertext and the interest ciphertext from the requester; and analyze whether the publisher's self-described information matches the requester's interest, and recommend friends according to the matching result;
[0043]The publisher is configured to encrypt its self-describing information according to the requester's interest policy, and send its self-describing ciphertext to the matching server; at the same time, add the corresponding tag attribute to its self-describing so that interested requesters can receive To the...
Embodiment 2
[0080] The purpose of this embodiment is to provide a friend recommendation method based on hidden policy attribute base encryption.
[0081] like figure 2 As shown, a flowchart of a friend recommendation method based on hidden policy attribute base encryption provided by the present disclosure, the steps include:
[0082] Step 1: In the initialization phase, the trusted center generates the public key PK and the system master key SK, the organization registers the publisher and the requester, and generates the interest attribute key for the requester;
[0083] Step 2: The matching server collects the requester's ciphertext of interest;
[0084] Step 3: The publisher encrypts the personal information ciphertext and sends it along with his self-describing ciphertext policy, and sends the self-describing tag key to the matching server;
[0085] Step 4: The matching server analyzes the interest ciphertext obtained from the requester and the publisher's self-describing cipherte...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com