User timely revocation method based on attribute-based encryption in cloud environment
An attribute-based encryption, cloud environment technology, applied in user identity/authority verification and key distribution, can solve the problem of slow revocation efficiency of cloud storage users, and achieve the effect of timely revocation, improving efficiency and reducing workload
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0100] Example 1
[0101] Such as figure 2 As shown, the present invention proposes a real-time user withdrawal method based on attribute-based encryption in a cloud environment, which includes the following steps:
[0102] Step 1: System parameter generation;
[0103] The trusted organization first randomly selects generators, generates bilinear groups and bilinear mappings, and generates two pairs of master keys and public keys. The master key is retained and the public key is disclosed;
[0104] Step 2: Generate private key and proxy rekey;
[0105] The user provides relevant information to the trusted organization and applies for access to the private key; the trusted organization allocates corresponding data attributes according to the information provided by the user to generate the private key SK u And send it to the user; the data owner sends the special attribute set of the file F to the trusted organization, and the trusted organization generates the private key SK for it x ,...
Example Embodiment
[0174] Example 2
[0175] Suppose a data owner O stores the file F in the CBS, and the user U applies to a trusted organization to obtain a partial private key, and then sends an application for access to the file F to the CPSP. The data owner performs two operations on the file: 1. Revoke the user; 2. Delete the file.
[0176] The specific implementation plan is:
[0177] (1) The trusted organization first randomly selects generators, generates bilinear groups and bilinear mappings, and generates two pairs of master keys and public keys. The master key is retained and the public key is disclosed.
[0178] (2) The data owner selects the attribute set for the file F to construct the access control tree T A , Select a special attribute set to construct an access control tree T x , Encrypt the file F to generate a ciphertext CT, and send it to the CPSP.
[0179] (3) CPSP selects a unique ID number for the file, generates a user revocation list of this file, saves the file to CBS, and then...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap