Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method for multiple authorization centers

An encryption method and authorizer's technology, applied in the field of information security, can solve the problems of reduced calculation cost and communication cost in the decryption stage

Inactive Publication Date: 2013-12-18
HOHAI UNIV
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, since the ciphertext length is fixed, the communication cost will be greatly reduced
On the other hand, since the number of pair operations in the decryption stage is fixed, the computational cost of the decryption stage will be greatly reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method for multiple authorization centers
  • Encryption method for multiple authorization centers
  • Encryption method for multiple authorization centers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Below in conjunction with accompanying drawing, the encryption method of a kind of multi-authorization center that the present invention proposes is described in detail: the mathematical theory used in the present invention illustrates:

[0046] 1. Bilinear Pairing

[0047] Here is a brief introduction to the basic definition of a bilinear map and the properties it needs to satisfy.

[0048] Order G 0 ,G 1 are two multiplicative cyclic groups of order p, where p is a prime number and g is G 0 generator of . Define the bilinear map on two groups as: e:G 0 ×G 0 →G 1 , and satisfy the following properties:

[0049] (1) Dual mapping: e(g a , h b )=e(g,h) ab , for all are established.

[0050] (2) Non-degenerate: e(g,g)≠1.

[0051] (3) Computability: There exists an efficient algorithm to compute e.

[0052] 2. Assumption of BDH (Decisional Bilinear Diffie-Hellman) difficult problem

[0053] Given a cyclic group G of order p 0 , where p is a prime number and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption method for multiple authorization centers. The method includes the steps that system parameters are firstly set; a public key and private keys of an authorizer are set according to the system parameters, the public key is used for encrypting data, and the private keys are used for generating a private key of a user; the private key of the user is used for decrypting an encrypted message. Through the encryption method which fixes the length of the encrypted message, includes the multiple authorization centers and is based on attributes, a center authorizer is removed, each authorization center independently manages the attribute and distributes the private keys, meanwhile, calculation cost and communication cost of the authorization centers and the user are reduced through the method, the encryption method is used for solving problems of access control and safety in cloud calculation, the efficiency of system operation is improved, and expenditure is saved.

Description

technical field [0001] The invention belongs to the technical field of information security, and specifically refers to an encryption method of multiple authorization centers. Background technique [0002] With the development of information technology, more and more sensitive data is stored on third-party sites and shared among Internet users. Since third parties may not be fully trusted, it is necessary to store this data in encrypted form. Attribute-based encryption ABE system has received more and more attention due to its special application significance and wide range of usage scenarios. Attribute-based encryption was first proposed by Sahai and Waters in 2005, and this system can be seen as a generalization of identity-based encryption. The user's identity in the system is no longer single, but is characterized by a descriptive attribute set, and the encryption and decryption processes are all associated with the access structure. In essence, the attribute-based en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30
Inventor 李继国钱慧玲张亦辰滕美林
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products