Encryption method for realizing support of FGAC (Fine Grained Access Control)

An access control and encryption method technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of monotonous encryption of files, complex key distribution and management, and inability to realize flexible control functions of access control technology, and achieve easy expansion and fine-grained Access control function, rich effect of access control operation

Inactive Publication Date: 2011-11-16
BEIHANG UNIV
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, conventional encryption technologies, including symmetric encryption technology and public key encryption technology, can only encrypt files monotonously. In a distributed environment, the distribution and management of keys is more complicated, and the flexible control of access control technology cannot be realized. Function
The recently proposed attribute-based encryption system (ABE) can realize access control based on encryption algorithm, key management and key distribution mechanism without load, but attribute-based encryption algorithm can only support AND, OR and threshold operation, and cannot realize detailed Granular access control and poor scalability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method for realizing support of FGAC (Fine Grained Access Control)
  • Encryption method for realizing support of FGAC (Fine Grained Access Control)
  • Encryption method for realizing support of FGAC (Fine Grained Access Control)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0031] The core idea mainly included in the present invention is to realize rich access control operations by extending the access control tree in the original attribute-based encryption scheme, and using the range of the threshold value k<0 to represent the extended access control operations, so as to realize flexible, Fine-grained encryption algorithm-based access control.

[0032] Before describing the scheme, define the following entities and methods:

[0033] 1. Key Generation Center (PKG): Responsible for publishing public parameters, generating private keys, managing user attribute information and verifying extended attributes submitted by users, it must be trusted.

[0034] 2. Let the threshold of the node be k, where the range of 0

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encryption method for realizing support of FGAC (Fine Grained Access Control), wherein an access control structure is an access control tree in an attribute-based encryption system, extended attribute nodes are represented by using a range of k being less than 0, and k represents an operation identifier corresponding to a specific operation (or function); leaf nodes ofk being less than 0 are called extended attribute leaf nodes, and subnodes of the extended attribute leaf nodes include one or more attributes and attribute value pairs. The data in the subnodes are input parameters needed by the operation function corresponding to the operation identifier k. The output of the function corresponds to the attribute values of the extended attribute nodes, and an extended operation comprises a matching function and a logical operator. The encryption method leads an attribute-based encryption algorithm to support abundant operations, and facilitates a flexible FGAC capability of the improved attribute-based encryption algorithm.

Description

technical field [0001] The invention relates to a flexible and fine-grained access control method proposed in a distributed environment, aiming at the requirements of file sharing and safe storage. The fine-grained access control method is mainly realized by extending the extension tree of the original attribute-based encryption algorithm. access control. Background technique [0002] In a distributed environment, especially in the cloud computing service model, after the user data is centralized, ensure that the internal security management and access control mechanism of the operation service provider meets the user's security needs, and avoid the coexistence of multiple users in the distributed environment or The potential risks posed by shared data are security challenges faced in a distributed environment. [0003] Currently, data centers protect data mainly through two methods: access control and encryption. Commonly used access control methods include discretionary ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 郎波高昊张然牛虹婷李未
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products