Method and apparatus for applying recipient criteria in identity-based encryption
First Claim
Patent Images
1. A method comprising:
- selecting, by an apparatus of an information sender, one or more recipient criteria for data, wherein the one or more recipient criteria include at least one user feature other than a user location;
formatting, by the apparatus, the selected one or more recipient criteria into a predetermined information representation format or structure;
encrypting, by the apparatus, the data using the formatted one or more recipient criteria as a public key of identity-based encryption;
causing, at least in part by the apparatus, a publication of the encrypted data as being publicly available; and
causing, at least in part by the apparatus, a transmission of a decryption key for the encrypted data via a network only to a requester for the encrypted data who satisfies the one or more recipient criteria,wherein recipient identification remains unknown to the information sender.
0 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for reducing communication traffic and cost by applying recipient criteria in identity-based encryption. A recipient criterion application selects one or more recipient criteria for data, and encrypts the data using the selected one or more recipient criteria as a public key of identity-based encryption.
25 Citations
20 Claims
-
1. A method comprising:
-
selecting, by an apparatus of an information sender, one or more recipient criteria for data, wherein the one or more recipient criteria include at least one user feature other than a user location; formatting, by the apparatus, the selected one or more recipient criteria into a predetermined information representation format or structure; encrypting, by the apparatus, the data using the formatted one or more recipient criteria as a public key of identity-based encryption; causing, at least in part by the apparatus, a publication of the encrypted data as being publicly available; and causing, at least in part by the apparatus, a transmission of a decryption key for the encrypted data via a network only to a requester for the encrypted data who satisfies the one or more recipient criteria, wherein recipient identification remains unknown to the information sender. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus of an information sender to perform at least the following; select one or more recipient criteria for data, wherein the one or more recipient criteria include at least one user feature other than a user location, format the selected one or more recipient criteria into a predetermined information representation format or structure, encrypt the data using the formatted one or more recipient criteria as a public key of identity-based encryption; cause, at least in part, a publication of the encrypted data as being publicly available; and cause, at least in part, a transmission of a decryption key for the encrypted data via a network only to a requester for the encrypted data who satisfies the one or more recipient criteria, wherein recipient identification remains unknown to the information sender. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus of an information sender to perform at least the following:
-
selecting one or more recipient criteria for data, wherein the one or more recipient criteria include at least one user feature other than a user location; formatting the selected one or more recipient criteria into a predetermined information representation format or structure; encrypting the data using the formatted selected one or more recipient criteria as a public key of identity-based encryption; causing, at least in part, a publication of the encrypted data as being publicly available; and causing, at least in part, a transmission of a decryption key for the encrypted data via a network only to a requester for the encrypted data who satisfies the one or more recipient criteria, wherein recipient identification remains unknown to the information sender. - View Dependent Claims (18, 19, 20)
-
Specification