METHOD AND APPARATUS FOR QUERYING CONTENT PROTECTED BY IDENTITY-BASED ENCRYPTION
First Claim
1. A method comprising:
- causing, at least in part, transmission of a query associated with a first user, the first user being described according to a first set of criteria; and
based, at least in part, on the query, receiving one or more second sets of criteria associated with respective second users, wherein the second sets of criteria are matched, at least in part, to the first set of criteria, and wherein at least one of the second sets of criteria is used as a public key for encrypting data according to an identity-based encryption scheme.
3 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for reducing communication traffic/cost and protecting content by applying recipient criteria in identity-based encryption. A criterion application of a querier causes, at least in part, transmission of a query associated with a first user described according to a first set of criteria. Based on the query, the criterion application of the querier receives one or more second sets of criteria associated with respective second users, wherein the second sets of criteria are matched, at least in part, to the first set of criteria, and wherein at least one of the second sets of criteria is used as a public key for encrypting data according to an identity-based encryption scheme. A criterion application of an information store receives the query associated with the first user, and matches one or more second sets of criteria with all or part of the first set of criteria.
52 Citations
21 Claims
-
1. A method comprising:
-
causing, at least in part, transmission of a query associated with a first user, the first user being described according to a first set of criteria; and based, at least in part, on the query, receiving one or more second sets of criteria associated with respective second users, wherein the second sets of criteria are matched, at least in part, to the first set of criteria, and wherein at least one of the second sets of criteria is used as a public key for encrypting data according to an identity-based encryption scheme. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, cause, at least in part, transmission of a query associated with a first user, the user being described according to a first set of criteria; and based, at least in part, on the query, receive one or more second sets of criteria associated with respective second users, wherein the second sets of criteria are matched, at least in part, to the first set of criteria, and wherein at least one of the second sets of criteria is used as a public key for encrypting data according to an identity-based encryption scheme. - View Dependent Claims (8, 9, 10)
-
-
11. A method comprising:
-
receiving a query associated with a first user, the first user being described according to a first set of criteria; matching one or more second sets of criteria with all or part of the first set of criteria, wherein the matching defines respective second users who are qualified to receive the query, and wherein at least one of the second sets of criteria is used as a public key for encrypting data associated with a respective second user according to an identity-based encryption scheme; and causing, at least in part, transmission of the second sets of criteria in response to the query. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, receive a query associated with a first user, the first user being described according to a first set of criteria; match one or more second sets of criteria with all or part of the first set of criteria, wherein the matching defines respective second users who are qualified to receive the query, and wherein at least one of the second sets of criteria is used as a public key for encrypting data associated with a respective second user according to an identity-based encryption scheme, and cause, at least in part, transmission of the second sets of criteria in response to the query. - View Dependent Claims (17, 18, 19, 20)
-
-
21-62. -62. (canceled)
Specification