Proxy re-encryption method and system for data sharing community
A technology of proxy re-encryption and data sharing, applied in the field of blockchain community applications, it can solve the problems of troublesome data sharers and lose the meaning of cloud data sharing, achieve high traceability, solve performance bottlenecks, and improve confidentiality.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0056] DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The following examples are intended to illustrate the invention, but not to limit the scope of the invention.
[0057] Example buy a
[0058] See figure 1 A proxy re-encryption method for data sharing community, the community data sharing, proxy re-encryption technology has been applied in two processes, namely data encryption and data decryption. The present embodiment relates to the application proxy re-encryption technology embodied in the community, data encryption and decryption specific steps are as follows:
[0059] Step 1: A sharer file using encrypted data files in the locally generated line AES symmetric key S sysKey Data encryption, the data encrypted ciphertext F sysEn , As shown in Equation (1):
[0060] Fly sysEn = E AESencryption (File, S sysKey )#(1)
[0061] Where E AESencryption AES is a symmetric encryption algorithm;
[0062] Step 2: The user public key pk data register as a shared community, will generat...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap