Method and apparatus for providing identity based encryption in distributed computations
First Claim
Patent Images
1. A method comprising:
- segmenting an executable computation closure into at least a first part and one or more second parts, wherein the computation closure comprises a computation procedure, wherein the computation procedure is executable in a distributed fashion in a computational architecture comprising a plurality of architectural levels, wherein the architectural levels comprise a device level, an infrastructure level, and a cloud computing level, together with process relations and process communications among various processes; and
encrypting one or more second parts using the first part as a public key of an identity-based encryption.
2 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure into at least a first part and one or more second parts. The identity based encryption platform also causes, at least in part, an encryption of the one or more second parts using the first part as a public key of an identity-based encryption.
-
Citations
22 Claims
-
1. A method comprising:
-
segmenting an executable computation closure into at least a first part and one or more second parts, wherein the computation closure comprises a computation procedure, wherein the computation procedure is executable in a distributed fashion in a computational architecture comprising a plurality of architectural levels, wherein the architectural levels comprise a device level, an infrastructure level, and a cloud computing level, together with process relations and process communications among various processes; and encrypting one or more second parts using the first part as a public key of an identity-based encryption. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following; segmenting an executable computation closure into at least a first part and one or more second parts, wherein the computation closure comprises a computation procedure, wherein the computation procedure is executable in a distributed fashion in a computational architecture comprising a plurality of architectural levels, wherein the architectural levels comprise a device level, an infrastructure level, and a cloud computing level, together with process relations and process communications among various processes; and encrypting the one or more second parts using the first part as a public key of an identity-based encryption. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer program product including a non-transitory computer-readable storage medium and one or more sequences of one or more instructions stored by the computer-readable storage medium, wherein the one or more instructions, when executed by one or more processors, cause an apparatus to at least perform:
-
segmenting an executable computation closure into at least a first part and one or more second parts, wherein the computation closure comprises a computation procedure, wherein the computation procedure is executable in a distributed fashion in a computational architecture comprising a plurality of architectural levels, wherein the architectural levels comprise a device level, an infrastructure level, and a cloud computing level, together with process relations and process communications among various processes; and encrypting the one or more second parts using the first part as a public key of an identity-based encryption.
-
Specification