Method for efficient public key encryption with forward security
A public key encryption, forward security technology, applied in the field of efficient public key encryption, can solve the problems of low encryption and decryption efficiency, and the forward security public key encryption scheme is not suitable for practical application.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] The forward-secure and efficient public key encryption scheme includes the following four polynomial time algorithms: efs-PKE.setup(), efs-PKE.upd(), efs-PKE.enc(), efs-PKE.dec(). Among them, the initialization algorithm efs-PKE.setup(T,1 k )=(PK,SK 1 ), enter the security parameter k and the total number of time periods T, and output the user's public key PK and initial private key SK 1 ; Key update algorithm efs-PKE.upd(i,SK i )=SK i+1 , Enter the private key SK for the i-th time period i , Get the private key SK for the i+1th time period i+1 , If i=T, then re-initialize the system; encryption algorithm efs-PKE.enc(PK,i,m)=c, use the public key PK to encrypt the plaintext m, and get the ciphertext c of m in the current time period i; decryption algorithm efs-PKE.dec(SK i ,i,c)=m, use the private key SK of the current time period i i Decrypt the ciphertext c and get the plaintext m. The specific plan is as follows:
[0040] An efficient public key encryption method with f...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com