Hierarchical optimization encryption lossless privacy protection method
A privacy protection and key technology, applied in the field of access control technology and cryptography, can solve the problems of slow encryption and decryption, limited application scenarios, key generation protection, etc., to strengthen security, improve execution efficiency, prevent tampering and fake effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] In order to facilitate the understanding of the present invention, the present invention will be understood in connection with the accompanying drawings and examples, and the embodiments described herein are intended to illustrate and explain the present invention. this invention.
[0034] One classification optimized encrypted lossless privacy protection method provided by the present invention includes the following steps:
[0035] Step 1: The data manager is based on the identity property of the authorized user, encrypts the attribute set of each authorized user with a key-based hash algorithm;
[0036] Please see figure 1 The specific implementation of the step 1 of the present embodiment includes the following sub steps:
[0037] Step 1.1: {Att 1 ATT 2 , ..., ATT m | m = 0, 1, 2, ..., m} indicates an authorized user U i M individual sets, existing N authorized users consisting with {u n }, Indicating that two linear group g 1 , Double linear mapping E: g 1 × g 1 → g 2 ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


