Unlimited revocable attribute-based encryption method
An attribute-based encryption, unlimited technology, used in user identity/authority verification, key distribution, and can solve problems such as being unable to cope with dynamic changes in user rights
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0013] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.
[0014] Method of the present invention is made up of seven algorithms, and concrete construction process is as follows:
[0015] (1) System establishment Setup: input the security parameter λ, and construct a group with order q and a bilinear pair Let g, h be the group Generators of , and then obtain the bilinear pairing group Randomly choose a collision-resistant cryptographic hash function And a binary tree BT wi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More