A system and method for proxy re-encryption based on certificateless conditions
A proxy re-encryption, certificate-free technology, applied in transmission systems, electrical components, usage of multiple keys/algorithms, etc., can solve the problems of third-party inquiry, high certificate verification cost, complicated certificate management, etc., and achieve excellent performance. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] The technical scheme of the present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments, so that those skilled in the art can better understand the present invention and implement it, but the examples given are not intended to limit the present invention.
[0033] In this system:
[0034] (1) Key generation center: responsible for system parameter generation, that is, generating system master key (private key of key generation center) and system public parameter set (including cyclic group, generator, master public key and hash function, etc. ), and a trusted third party that generates some public-private key pairs for system users;
[0035] (2) Client: The original receiver of the encrypted message is the entity that entrusts the receiver to exercise the decryption right;
[0036] (3) Accepting party: the entity that receives the authorization of the entrusting party and exercises the decryption ri...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com