Universal black box traceable method and device for attribute-based proxy re-encryption system
A proxy re-encryption and re-encryption technology, applied in the field of information security and privacy protection, can solve problems such as hindering the application and development of encryption primitives, and AB-PRE system security threats, so as to resist the risk of key leakage and prevent it from being destroyed again. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0056] The present invention will be further explained below in conjunction with specific embodiments. It should be understood that these embodiments are only used to illustrate the present invention and not to limit the scope of the present invention. The modifications all fall within the scope defined by the appended claims of this application.
[0057] A general black-box traceability method for an attribute-based proxy re-encryption system, including system initialization, key generation, re-encryption key generation, encryption, re-encryption, decryption, re-decryption and traceability are implemented in eight parts. The system implementation process is as follows figure 1 shown. combine figure 1 , the method is described as follows:
[0058] System initialization is the generation of system public parameters by the attribute authority AA, including the system master public key and master private key, and tracking related parameters;
[0059] The key generation is tha...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

