Method and apparatus for providing identity based encryption in distributed computations
First Claim
Patent Images
1. A method, comprising:
- segmenting a computation closure into at least a first part and one or more second parts, wherein the computation closure comprises a computation procedure and inter-process relations and inter-process communications;
encrypting the one or more second parts using the first part as a public key based on an identity-based encryption; and
determining one or more anonymization policies associated with the identity-based encryption, the computation closure, the first part, the one or more second parts, or a combination thereof,wherein the encryption is based, at least in part, on the one or more anonymization policies.
2 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure into at least a first part and one or more second parts. The identity based encryption platform also causes, at least in part, an encryption of the one or more second parts using the first part as a public key of an identity-based encryption.
-
Citations
18 Claims
-
1. A method, comprising:
-
segmenting a computation closure into at least a first part and one or more second parts, wherein the computation closure comprises a computation procedure and inter-process relations and inter-process communications; encrypting the one or more second parts using the first part as a public key based on an identity-based encryption; and determining one or more anonymization policies associated with the identity-based encryption, the computation closure, the first part, the one or more second parts, or a combination thereof, wherein the encryption is based, at least in part, on the one or more anonymization policies. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
at least one processing device; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one, processing device, cause the apparatus to perform at least the following, cause a segmentation of a computation closure into at least a first part and one or more second parts, wherein the computation closure comprises a computation procedure and inter-process relations and inter-process communications; cause an encryption of the one or more second parts using the first part as a public key based on an identity-based encryption; and determine one or more anonymization policies associated with the identity-based encryption, the computation closure, the first part, the one or more second parts, or a combination thereof, wherein the encryption is based, at least in part, on the one or more anonymization policies. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification