Ciphertext policy attribute-based encryption system and method

An attribute-based encryption and attribute technology, applied in key distribution, can solve the problems of no security performance of the system, high communication and computing costs, and heavy workload.

Active Publication Date: 2010-08-18
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the disadvantage of this scheme is that there is only one private key distribution organization
This means: First, since a single private key distribution agency needs to be responsible for the distribution of all private keys and the corresponding attribute verification work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext policy attribute-based encryption system and method
  • Ciphertext policy attribute-based encryption system and method
  • Ciphertext policy attribute-based encryption system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described more fully hereinafter with reference to the accompanying drawings showing preferred embodiments of the invention. It should be understood that the invention may be embodied in other different forms and should not be limited to the embodiments described herein. Rather, the following embodiments are provided only to fully and completely convey the scope of the present invention to those skilled in the art.

[0036] The cryptographic policy attribute-based encryption system and method according to the present invention will now be described with reference to the accompanying drawings. In the following description, a detailed description of well-known functions and configurations incorporated herein will be omitted since it may obscure the present invention.

[0037]

[0038] figure 2 is a schematic block diagram illustrating a cryptographic policy attribute-based encryption system with a central authority in accordance with a f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a ciphertext policy attribute-based encryption system and a ciphertext policy attribute-based encryption method, which comprise ciphertext policy attribute-based encryption systems with a central mechanism and without the central mechanism and a ciphertext policy attribute-based encryption method. The ciphertext policy attribute-based encryption system with the central mechanism comprises a plurality of attribute mechanisms of the central mechanism, an encrypting component and a client. The plurality of attribute mechanisms of the central mechanism initialize the system together, publish a system public key, and generate a system private key, a local private keys of an attribute mechanism and local public keys; the encrypting component encrypts a cleartext based on the system public key, each local public key and a universal access tree; and the client inputs a client identifier, client attribute sets and the like so as to generate client private key used for decrypting the encrypted ciphertext. Due to the implementing mode of the invention, a multi-mechanism ciphertext policy attribute-based encryption system is designed. The scheme is based on the ciphertext policy, so the scheme better meets the access control requirement in an actual information safety system.

Description

technical field [0001] The invention relates to a ciphertext policy attribute-based encryption system and an encryption method thereof, in particular to a ciphertext policy attribute-based encryption system including a plurality of attribute institutions with or without a central authority and an encryption method thereof. Background technique [0002] The attribute-based encryption scheme was first proposed by Vipul Goyal, Omkant Pandey, Amit Sahai and Brent [0003] Waters [1] propose. Early attribute-based encryption schemes were mainly private-key-policy, meaning that the ciphertext reflected the set of attributes and the private key represented the access control policy. [0004] figure 1 is a schematic diagram illustrating a private key distribution system of an attribute encryption scheme according to a prior art private key policy. Such as figure 1 As shown, the private key distribution system includes a private key distribution organization 10 and two confident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
Inventor 曹珍富董晓蕾林煌邢东升
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products