Attribute-based encryption method for achieving hierarchical certification authority

An attribute-based encryption and certification authority technology used in public keys and key distribution for secure communications

Active Publication Date: 2014-03-19
BEIHANG UNIV
View PDF1 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, for a multinational company, its various departments and corresponding employees are distributed in different places, and there is often a hierarchical relationship between various departments and employees. Hierarchical relationships between certification bodies should be considered, which is rarely addressed in existing multi-certification body ABE schemes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based encryption method for achieving hierarchical certification authority
  • Attribute-based encryption method for achieving hierarchical certification authority
  • Attribute-based encryption method for achieving hierarchical certification authority

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The attribute-based encryption method for implementing a hierarchical certification authority will be described in detail below in conjunction with the accompanying drawings. The present invention can be divided into four stages of initialization, private key extraction and distribution, encryption, and decryption. There are 6 steps in total, see figure 1 , the specific steps of the method are as follows:

[0050] Phase 1: Initialization phase

[0051] Step 1: Central authority initialization. The central authority first defines the global attribute domain, assuming that N={1,...,n} (n is a certain natural number), and each attribute i∈N and its inverse It all makes sense. Then according to the system security parameter k, select a bilinear group with prime order p and there is a bilinear map choose random number as well as A random generator g of , and then calculate Y=e(g,g) y , T k = g ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attribute-based encryption method for achieving a hierarchical certification authority. The attribute-based encryption method for achieving the hierarchical certification authority mainly comprises the following steps of 1) initialization of a central authority; 2) initialization of multilayer certification authorities; 3) user registration and certification; 4) extraction and distribution of private keys; 5) encryption; 6) decryption. The attribute-based encryption method for achieving the hierarchical certification authority achieves hierarchical distribution of multiple certification authorities on the basis of an attribute-based encryption system of a ciphertext policy, facilitates management of the central authority to the certification authorities, and is applicable to shared data encryption solution in a large organization structure of hierarchical distribution. Besides, during the extraction and distribution process of the private keys, overlapping among attribute sets of different users is allowed, so that the attribute-based encryption method for achieving the hierarchical certification authority has wider adaptability in practical application.

Description

(1) Technical field [0001] The invention relates to an attribute-based encryption method for realizing a hierarchical authentication mechanism, which is also an attribute-based encryption method for a cipher text policy for realizing fine-grained access control, and belongs to the field of public key encryption systems. (2) Background technology [0002] With the development of computer and network technology, people pay more and more attention to information security, among which the most basic and core technology is information encryption. There are two branches in the modern encryption system: symmetric encryption system and public key encryption system. Among them, the public key encryption system uses an asymmetric key, which does not require key negotiation between the encryptor and the decryptor, and reduces the security requirements for the communication channel, so it has been widely used. [0003] However, the traditional public key encryption system also has some...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08
Inventor 刘建伟艾倩颖
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products