Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safely outsourced attribute-based encryption method

An encryption method and security outsourcing technology, applied in the field of attribute-based encryption, can solve problems such as complex efficiency

Active Publication Date: 2012-11-07
GUANGZHOU UNIVERSITY
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to overcome the complex and low-efficiency shortcomings of the prior art, and provide a secure outsourcing attribute-based encryption method to efficiently implement attribute-based encryption, improve efficiency, and save expenses for attribute authorities and users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safely outsourced attribute-based encryption method
  • Safely outsourced attribute-based encryption method
  • Safely outsourced attribute-based encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] One, the applied mathematical theory of the present invention explains:

[0067] 1. Bilinear pairing

[0068] In the present invention, the bilinear pair e: G×G→G T is a mapping that satisfies bilinearity, non-degenerateness, and computability, and it maps two elements in the prime order group G to the prime order group G T an element in . For example, a Tate pair defined on a supersingular elliptic curve is a bilinear pair that satisfies the condition.

[0069] 2. Lagrange coefficient

[0070] For d-1 degree polynomial f(x) and set S={x 1 ,x 2 ,...,x d}, with element x i The Lagrangian coefficient corresponding to the set S is From the Lagrangian coefficients, the polynomial f(x) can be calculated as follows:

[0071] f(x)=∑ i∈S Δ i,S f(x i ),

[0072] Here, the Lagrange coefficient is Δ i,S is a polynomial in the independent variable x, so

[0073] f(0)=∑ i∈S Δ i,S (0)f(x i ).

[0074] Two, the realization process of the present invention

[0075]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safely outsourced attribute-based encryption method, which supports outsourcing for secret key distribution and decryption. The method comprises the following steps: (1) system establishing; (2) initialization of outsourcing secret key generation; (3) generation of an external secret key; (4) generation of an internal secret key; (5) blinding of conversion secret key; (6) encryption; (7) partial decryption; and (8) complete decryption. The safely outsourced encryption method has the advantages of simple construction process and high transmission efficiency and can be used for realizing fine-grained resource access control under a cloud computing environment, and a large amount of expenditure is saved for attribute authorities and users.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to attribute-based encryption, in particular to an attribute-based encryption method capable of safely and efficiently outsourcing key distribution and decryption, which can be used to implement fine-grained encryption in a cloud computing environment. Resource access control. Background technique [0002] As a novel public-key cryptography primitive, attribute-based encryption (ABE) has attracted extensive attention in academia. ABE implements public key-based one-to-many encryption for the first time. In an attribute-based encryption system, a user's key and ciphertext are associated with descriptive attribute sets and access policies, respectively. A specific key can decrypt a specific ciphertext only if the associated attributes and access policies match each other. Currently, two attribute-based encryption methods have been proposed, including key-policy attribute...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26H04L12/24
CPCH04L9/0819H04L9/0827H04L9/0847H04L2209/76
Inventor 李进张应辉李经纬陈晓峰谢冬青
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products