NOT operational character supported characteristic-based CP-ABE method having CCA security

A CP-ABE, operator technology, applied in safety communication devices, digital transmission systems, electrical components, etc., can solve problems such as increased system overhead, poor flexibility, and inability to support NOT operation

Inactive Publication Date: 2013-10-09
BEIHANG UNIV
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the deployment of a cryptographic system will definitely increase the overhead of the entire system. The most important thing is whether the access control model used by the system can be organically combined with the encryption system, while ensuring the implementation of access policies and ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • NOT operational character supported characteristic-based CP-ABE method having CCA security
  • NOT operational character supported characteristic-based CP-ABE method having CCA security
  • NOT operational character supported characteristic-based CP-ABE method having CCA security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0015] The core idea mainly included in the present invention: destroy the Shamir secret sharing mechanism, and destroy the interpolation points related to the NOT attribute when performing Lagrangian interpolation backtracking calculation, so that when the calculation goes back to the root node of the strategy tree, q can be obtained R (0)≠s. Then from the user's perspective, the decryption algorithm has been executed, but the final M obtained is not the correct M, thus achieving the purpose of the NOT operation.

[0016] Before describing the method, define the following parameters and methods:

[0017] 1. G 0 and G 1 It is a multiplicative cyclic group with two orders of large prime number p, and g is the group G 0 The generator of e:G 0 ×G 0 →G 1 is an efficiently computable bilinear map. Z p is a set obtained modulo p, including all positi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a NOT operational character supported characteristic-based CP-ABE method having CCA security. An access control structure is an access control tree; a NOT node is added in the access control tree; and k is equal to -1. Meanwhile, according to regulation, a father node of the NOT node must be an ''AND'' node and only one intermediate node is hung under the NOT node; and thus the intermediate node is used as a root node to set a strategy tree and the strategy tree expresses a related strategy, set by an encryption party, of a NOT attribute. A high one-time signature technology is added to further enhance a security level of the method from a CPA security level to a CCA security level. Strategy expression based on an attribute encryption algorithm is enriched; security of the existing method is enhanced, thereby building the high access controlling capability; and moreover, the method has an encryption method with a provable security.

Description

technical field [0001] The invention relates to an attribute-based encryption method based on an extended ciphertext strategy that has strong access control capability and achieves CCA security in a distributed environment, aiming at the requirements of file sharing and safe storage. Background technique [0002] In a distributed environment, especially in the service model of cloud computing, after user data is centralized, ensure that the internal security management and access control mechanism of the cloud service provider meets the user's security needs, and avoid the coexistence of multiple users in a distributed environment or The potential risks posed by shared data are security challenges faced in a distributed environment. [0003] Currently, data centers protect data in two ways: access control and encryption. Commonly used access control methods include discretionary access control policy (DAC), mandatory access control policy (MAC) and role-based access control...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/00
CPCH04L9/3073
Inventor 郎波张然汪金苗
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products