Research Article
Privacy Protection of Social Networks Based on Classified Attribute Encryption
| Input: access structure tree, new encryption key, ciphertext CT | | Output: CT′ | (1) | //Calculate the encrypted , C′. | (2) | = CT · ; | (3) | C′ = ; | (4) | ; | (5) | ; | (6) | CT′ = {T′, , C, , }; |
|