Attribute protection based multiple authorization center encryption method

An encryption method and authorization center technology, applied in the field of information security, can solve problems such as leakage of user privacy

Inactive Publication Date: 2013-11-20
HOHAI UNIV
View PDF2 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional ABE scheme, the access policy is sent to the receiver along with the ciphertext, so no matter whether the receiv

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute protection based multiple authorization center encryption method
  • Attribute protection based multiple authorization center encryption method
  • Attribute protection based multiple authorization center encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Below in conjunction with accompanying drawing, a kind of multi-authorization center encryption method based on attribute protection that the present invention proposes is described in detail:

[0068] The mathematical theory used in the present invention illustrates:

[0069] 1. Bilinear Pairing

[0070] Here is a brief introduction to the basic definition of a bilinear map and the properties it needs to satisfy.

[0071] Order G 0 ,G 1 are two multiplicative cyclic groups of order p, where p is a prime number and g is G 0 generator of . Define the bilinear map on two groups as: e:G 0 ×G 0 →G 1 , and satisfy the following properties:

[0072] (1) Dual mapping: e(g a ,h b )=e(g,h) ab , for all g, h∈G 0 ,a, are established.

[0073] (2) Non-degenerate: e(g,g)≠1.

[0074] (3) Computability: There exists an efficient algorithm to compute e.

[0075] 2. Assumption of BDH (Decisional Bilinear Diffie-Hellman) difficult problem

[0076] Given a cyclic group G...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attribute protection based multiple authorization center encryption method. The method comprises the steps of setting system parameters first, and then setting a public key and a private key of an authorized person, wherein the public key is used for encrypting data, and the private key is used for generating a private key of a user. The private key of the user is generated by adopting a method of blind calculation, and the private key of the user is used for decrypting messages. According to the method provided by the invention, two-party safety blind calculation is executed between the user and the authorized person; commitment is carried out on a user global identification code (GID) by using a method of completely concealing the commitment, thereby preventing a malicious authorized person from collecting attributes of the user through tracking the user global identification code (GID); a zero-knowledge proof method enables a certifier to let a verifier believe certain attribute information is correct under the condition of not providing any useful information to the verifier, thereby protecting the user privacy; and the method is used for solving problems of access control and safety in cloud calculation, and the system operation efficiency is high.

Description

technical field [0001] The invention belongs to the technical field of information security, and specifically refers to a multi-authorization center encryption method based on attribute protection. Background technique [0002] Cloud computing is an Internet-based form of computing whereby shared software resources and information are made available to computers and other devices on demand. In recent years, with the development of cloud computing, people are more and more concerned about the security of cloud computing data storage, which gradually hinders the development of cloud computing technology. This concern is largely due to the fact that user data is stored in public clouds, which are managed by untrusted third parties. One way to solve this problem is to store the data in an encrypted form in the public cloud, so that an untrusted third party can only obtain the ciphertext, but not the corresponding plaintext. But this brings another problem. When a user wants to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/30
Inventor 李继国钱慧玲张亦辰滕美林
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products