摘要 |
PROBLEM TO BE SOLVED: To ensure security of data in a network. SOLUTION: (1) An author A indicates a copyright label (L0 ) to a data management center to request the distribution of an original private key (Ks0 ). (2) The center encrypts the L0 and its corresponding key Ks0 with a public key (Kba ) of the author A and distributes the encrypted original private key (Cks Okba ) to the author A. In this case the center applies undirectional hash processing to the L0 to generate a label fingerprint (D0 ) and distributes it to the author A. (3) The author A decodes the key (Cks Okba ) with a specified key of the author A and encrypts original work data (M0 ) with the decoded Ks0 and transfers the encrypted M0 , the L0 and the F0 to a first user U1 . (4) The first user U1 indicates the L0 , the F0 and a 1st user label (Lu1 ) to the center to ask for the distribution of a 1st private key (Ks1 ). (5) the center confirms the user to be a legal user through the F0 , registers the label Lu1 and encrypts the Ks0 and the Ks1 with the public key of the first user U1 and distributes the result to the first user U1 . (6) The first user U1 , decodes the encrypted keys by the specified key of the U1 and uses the Ks0 to decode the encrypted data. |