Authenticable agent re-encryption system and method based on symmetric cryptography
A proxy re-encryption and symmetric cipher technology, applied in the field of proxy re-encryption systems, can solve the problems of slow encryption, practicality discount, and inability to adapt.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0076] This embodiment discloses an authenticated proxy re-encryption system based on symmetric cryptography, as shown in the attached figure 1 As shown, the system includes:
[0077] 1) User side
[0078] The client is used to initiate a re-encryption request to the agent. It includes random number generator, key generation module, encryption module, decryption module and key update module. When data needs to be re-encrypted, the random number generator first generates a random number, uses the key generation module to generate a new encryption key and a new authentication key, and then uses the key update module to generate the re-encryption key and authentication The key is transformed, and then the random number, the re-encryption key and the authentication transformation key are sent to the re-encryption module of the agent. In addition to being able to initiate a re-encryption request to the agent, the user can also encrypt and decrypt data.
[0079] Random number generato...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com