Encrypted access control method under CCN
A content-centric network and access control technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve problems such as access control failure, and achieve the effect of satisfying integrity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] The present invention will be further described below in conjunction with specific embodiment:
[0022]An encrypted access control method under a content-centric network described in this embodiment involves multi-receiver broadcast encryption:
[0023] Let G 1 and G 2 are respectively the additive cyclic group and the multiplicative cyclic group of order prime q, and there is the following computable map e:G 1 ×G 1 →G 2 , for any P,Q,R∈G 1 with There is: e(aP,βQ)=e(P,Q) aβ ;
[0024] Define a bilinear mapping system S=(p,G 1 ,G 2 , e(·,·)), e:G 1 ×G 1 →G 2 , choose G∈G randomly 1 ,H∈G 2 ,
[0025] Let the encryption public key PK=(H, W, V), V=e(g 1 , g 2 ), W=γG, γ is The random number of the system master key MK=(a,b,γ,G), which is not disclosed to the public; each receiver defines the decryption private key as d i =(x i ,A i ,B i ),in,
[0026] To generate a common key that can be decrypted by multiple recipients, the publisher simply cho...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com