Ciphertext policy based revocable attribute-based encryption method and equipment and system utilizing same

An attribute-based, ciphertext technology, applied in the field of cryptography, which can solve problems such as inapplicability

Inactive Publication Date: 2012-07-04
SONY CORP
View PDF6 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, this periodic key update method is not suitable when the number of users in the identity-based encryption system increases sharply, because the workload of PKG will be proportional to the number of system users in this case

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext policy based revocable attribute-based encryption method and equipment and system utilizing same
  • Ciphertext policy based revocable attribute-based encryption method and equipment and system utilizing same
  • Ciphertext policy based revocable attribute-based encryption method and equipment and system utilizing same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Exemplary embodiments of the present invention will be described below with reference to the accompanying drawings. In the interest of clarity and conciseness, not all features of an actual implementation are described in this specification. It should be understood, however, that in developing any such practical embodiment, many implementation-specific decisions must be made in order to achieve the developer's specific goals, such as meeting those constraints related to the system and business, and those Restrictions may vary from implementation to implementation. Moreover, it should also be understood that development work, while potentially complex and time-consuming, would at least be a routine undertaking for those skilled in the art having the benefit of this disclosure.

[0043] Here, it should also be noted that, in order to avoid obscuring the present invention due to unnecessary details, only the device structure and / or processing steps closely related to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a ciphertext policy based revocable attribute-based encryption method and equipment and a system utilizing same. A key generation method includes of inputting safety parameters; executing the initializing algorithm according to the input safety parameters to output system public parameters, a main system private key, a first system private key and a second private key by an output system; setting an attribute set, distributing at least one user attribute, which corresponds to the user identity and belongs to the attribute set, for users; executing the private key generation algorithm according to the user identity and the at least one user attribute to generate a user private key; setting a revocation list of each attribute belonging to the attribute set to reflect corresponding relation between each attribute and the user identity of the user, of the attribute, revoked at the current moment; and executing the private key updating algorithm by the second system private key on the basis of the current revocation list so as to generate private key updated information.

Description

technical field [0001] The invention relates to the technical field of cryptography, in particular to a revocable attribute-based encryption method, device and system based on ciphertext policy. Background technique [0002] Traditional public-key encryption systems require a public-key infrastructure (PKI) to be responsible for verifying the correspondence between user identities and their public keys. Public key infrastructure ensures that cryptographers can verify the correspondence between other user identities and the public keys they use by publishing some public information. Since the encryptor needs to check whether the receiver's public key and the certificate are qualified, the calculation and communication burden of the traditional public key encryption system is greatly increased. The concept of Identity-Based Encryption (IBE) was proposed by Shamir in Reference 1 below in 1984, with the aim of eliminating the need for public key infrastructure in traditional en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32
Inventor 曹珍富董晓蕾林煌张华君马融
Owner SONY CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products