Attribute-Based Encryption with Certificates
An identity encryption and certificate technology, applied in the field of electronic information security, can solve the problems of complex implementation, unpublished certificates, and low security of key escrow.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0057] This embodiment provides an attribute-based identity-based encryption method with a certificate, the flowchart of which is as follows figure 1 It includes the following processing steps:
[0058] Step 11: The certificate authority CA generates and publishes system parameters by selecting the elliptic curve and the set of all attributes, and selecting the master key and security parameters.
[0059] The above CA is based on the security parameter k, selects the finite field and the ordinary elliptic curve on the finite field, and then selects the efficient asymmetric bilinear pairing e:G on the elliptic curve 1 ×G 2 →G T , select the generator in the paired group, where G 1 and G 2 is the additive group of the primes of order p on the elliptic curve, G T is the p-order multiplicative group in the finite field;
[0060] Take G respectively 1 and G 2 The generators P and Q of ; denote U as the set of all attributes;
[0061] Randomly pick a non-zero element α∈Z P...
Embodiment 2
[0082] This embodiment provides an identity-based encryption device with certificates and attributes, and its specific implementation structure is as follows: figure 2 As shown, it can specifically include the following modules:
[0083] The system parameter generation module 20 is used for the certificate authority CA to generate and issue system parameters by selecting the elliptic curve and the set of all attributes, and selecting the master key and security parameters;
[0084] The user certificate and key generation module 30 is used for the user to provide information to the above-mentioned CA, obtain the certificate issued by the CA to the above-mentioned user, verify the certificate, and use the above-mentioned certificate and the above-mentioned system parameters to generate the private key of the above-mentioned user, and disclose the above-mentioned the public key of the user, said user including the sender and receiver;
[0085] The plaintext message encryption m...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com