An Intergroup Proxy Re-encryption Method Resistant to Selected Ciphertext Attacks
A technology of chosen ciphertext attack and proxy re-encryption, applied in transmission systems, electrical components, etc., can solve problems such as security and efficiency to be improved, achieve reliable and convenient data sharing, resist chosen ciphertext attack, and facilitate encryption The effect of decryption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.
[0046] specifically, figure 1 is a schematic diagram of an inter-group proxy re-encryption method that is resistant to chosen ciphertext attacks. The trusted third party PKG generates public and private keys for group A and group B respectively, and generates a re-encryption key for the agent. Group A sends the signed ciphertext to the proxy. The agent verifies the ciphertext and re-encrypts the ciphertext with the re-encryption key to generate a ciphertext that can be decrypted and verified by members of group B.
[0047] KeyGen(g, g 1 , g 2 , h)→((l, PK A ,(d i1 , d i2 )), (k, PK B ,(t i1 , t i2 )))
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com