A keyless escrow multi-authorization attribute-based encryption method and system
An authorization attribute and key escrow technology, applied in the field of cloud computing security, can solve the problems of key escrow, data owners cannot access cloud server data access management, etc., achieve strong anti-key escrow performance, and alleviate key escrow problems. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application.
[0052] like figure 1 As shown, the present invention discloses a keyless escrow multi-authorization attribute-based encryption system, which includes five roles: user identity manager (IDM), attribute authorization center (AAs), data owner (DO), data User (DU) and Cloud Storage Server (CSS). The data user DU submits its legal identity information and commitment value to IDM. After the IDM successfully detects the identity of the DU, the IDM generates and returns a corresponding certificate containing the DU's commitment value. When the DU applies for the decryption key to the AAs, it also submits the corresponding commitment value. After the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com