Key encryption method based on file attribution

A key encryption and file attribute technology, applied in electrical components, digital transmission systems, secure communication devices, etc., can solve the problems of low efficiency of distributed storage systems, unguaranteed key security, and cumbersome user verification certificates. , to achieve the effect of reducing time complexity, protecting security, and efficient data encryption

Inactive Publication Date: 2012-08-01
HUAZHONG UNIV OF SCI & TECH
View PDF4 Cites 61 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage is that both the sending and receiving parties must use the same key, and use the unique key that others do not know, so the security of the key cannot be guaranteed, so it is difficult to use the symmetric encryption system on the distributed file storage system
This org

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key encryption method based on file attribution
  • Key encryption method based on file attribution
  • Key encryption method based on file attribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0026] Such as figure 1 Shown, the inventive method comprises the following steps:

[0027] (1) Receive user files, generate attribute set S={s according to user files 1 ,s 2 ,...,s n}, access structure tree P, master key MK and public key PK;

[0028] The access structure tree is used to describe an access control strategy, each leaf node of the tree represents an attribute item, and each internal node represents a relation function, and the relation function is AND or OR threshold. PK=G 0 , g; MK=(β, g α ), where g is a generator, G 0 is the prime number order group whose generator is g, and α and β are two randomly generated natural numbers;

[0029] (2) Randomly generate a symmetric key DEK, and use the symmetric key DEK and the Advanced Encryption Standard (AES for short) symmetric encryption algorithm to encrypt user files to obta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key encryption method based on file attribution. The key encryption method comprises the following steps of: receiving a user file, generating an attribution aggregate, an access structure tree, a main key and a public key according to the user file, randomly generating symmetric keys, encrypting the user file by using the symmetric keys and a symmetric encryption algorithm to obtain data cipher text, encrypting the symmetric keys by utilizing the public key and the access structure tree to generate a key cipher text, generating a private key associated with the attribution aggregate by utilizing the main key and the attribution aggregate, transmitting the key cipher text and the data cipher text to a server to store, obtaining the key cipher text and the data cipher text from the server by a user, decrypting the key cipher text by using the private key by the user to judge whether the attribution aggregate associated with the private key meets the access structure tree or not, and if meeting the access structure tree, decrypting the symmetric key and decrypting the data cipher text by utilizing the symmetric key through the user to obtain plaintext data. According to the key encryption method based on the file attribution, disclosed by the invention, data is encrypted by the symmetric encryption algorithm, the safety of the symmetric key is protected based on attribution encryption, and the high-efficiency safe access of encrypted data is realized.

Description

technical field [0001] The invention belongs to the field of computer security, and in particular relates to a key encryption method based on file attributes. Background technique [0002] In cloud storage, since the data is in a domain beyond the user's control, in order to protect the privacy of sensitive data, the data is usually encrypted first to protect the security of the data. But at the same time, it brings new challenges - due to the unfixed decryption party users in the distributed environment, the diversity of data file types and sizes, the use of traditional symmetric encryption is not safe, and the use of traditional public key cryptosystem encryption is not efficient. At the same time, in order to protect the privacy of the shared data, the user needs to implement an access control policy for the ciphertext. For example, he can define a policy that only personnel above the level and with administrative authority can access a certain top-secret document. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28
Inventor 金海唐勇邹德清羌卫中徐鹏
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products