METHOD AND APPARATUS FOR APPLYING RECIPIENT CRITERIA IN IDENTITY-BASED ENCRYPTION
First Claim
Patent Images
1. A method comprising:
- selecting one or more recipient criteria for data; and
encrypting the data using the selected one or more recipient criteria as a public key of identity-based encryption.
2 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for reducing communication traffic and cost by applying recipient criteria in identity-based encryption. A recipient criterion application selects one or more recipient criteria for data, and encrypts the data using the selected one or more recipient criteria as a public key of identity-based encryption.
-
Citations
20 Claims
-
1. A method comprising:
-
selecting one or more recipient criteria for data; and encrypting the data using the selected one or more recipient criteria as a public key of identity-based encryption. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following; select one or more recipient criteria for data, and encrypt the data using the selected one or more recipient criteria as a public key of identity-based encryption. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to perform at least the following:
-
selecting one or more recipient criteria for data; and encrypting the data using the selected one or more recipient criteria as a public key of identity-based encryption. - View Dependent Claims (18, 19, 20)
-
Specification