http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11233646-B2
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_fe01d67a002dfa0f3ac084298142eccd |
classificationCPCAdditional | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2211-007 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2211-008 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0816 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3093 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-08 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-008 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0894 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-08 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G09C1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00 |
filingDate | 2017-11-15-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
grantDate | 2022-01-25-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b631e265c3f3cbcc31372cc2ae3f43f2 |
publicationDate | 2022-01-25-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | US-11233646-B2 |
titleOfInvention | Searchable encryption method |
abstract | A method for searchable encryption of a system defining a secret key and a public is provided. A data stream cipher can include n elementary data (b 1 , b 2 , . . . , b n ). The method can include generation of a variate for all elementary data b j , for values of j from 1 to n, generation of an element function of the public key (g x(bj),zj ) and the variate, the element being associated with a random element of a group of a bilinear environment, the element associated with the random element of the group forming first encryption data (C j,1 ). The method can also include generation of a shift factor (g a.zj−1 ) function of the variate and the public key, and associated with the random element of the group, the shift factor representing a position of the monomial in the encrypted stream, the shift factor associated with the random element of the group forming second encryption data. The data stream cipher can include the first and second encryption data for all values of j from 1 to n. |
priorityDate | 2016-11-28-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Predicate | Subject |
---|---|
isDiscussedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID451839851 http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID23683938 |
Total number of triples: 26.