A Hierarchical Optimal Encryption Lossless Privacy Protection Method
A privacy protection and key technology, applied in the field of access control technology and cryptography, it can solve the problems of limited application scenarios, key generation protection, slow encryption and decryption speed, etc., to improve execution efficiency, prevent tampering and forgery, and strengthen security. sexual effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.
[0034] A kind of hierarchical optimization encryption lossless privacy protection method provided by the present invention comprises the following steps:
[0035] Step 1: Based on the identity attribute set of the authorized user, the data manager uses a hash algorithm with a key to perform encryption preprocessing on the attribute set of each authorized user;
[0036] please see figure 1 , the specific implementation of step 1 in this embodiment includes the following sub-steps:
[0037] Step 1.1: start with {att 1 , att 2 ,..., att m |m=0, 1, 2, ..., M...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


