Unlock instant, AI-driven research and patent intelligence for your innovation.

Provably secure attribute-based online/offline encryption method

An encryption method and off-line key technology, applied in the construction field of ABOOE

Active Publication Date: 2017-05-17
北京未来云服科技有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, Chow et al. also raised the new question whether it is possible to construct a provably secure attribute-based online / offline encryption mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Provably secure attribute-based online/offline encryption method
  • Provably secure attribute-based online/offline encryption method
  • Provably secure attribute-based online/offline encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] 1. First introduce the definition of the basic knowledge related to the method of the present invention, mainly including

[0017] Symmetric bilinear pair definition: let and is a multiplicative cyclic group of order large prime p, g is The generator of , if there is a mapping e: The following conditions are met: (1) Bilinear: For e(u a ,v b )=e(u,v) ab ; (2) non-degenerate: e(g, g)≠1; (3) computability: There are efficient algorithms to compute e(u,v) in polynomial time; then the above map e is called a symmetric bilinear pair.

[0018] l-DBDHI Hypothetical Definition: The l-DBDHI problem is in The above is defined as: randomly select α∈Z p * , g is The generator of , given a (l+2) tuple Determine whether the value of T is e(g,g) 1 / α . If for any probabilistic polynomial time (PPT) algorithm exist The advantages of solving the l-DBDHI problem above are negligible, then the l-DBDHI hypothesis is above is established.

[0019] l-BDHI Hyp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an ABOOE method. The ABOOE method has the plaintext safety selection function and the ciphertext safety selection function. The encryption process based on ABE is decomposed into the offline stage and the online stage. At the offline stage, on the premise that plaintexts and needed attribute sets are unknown, complex calculation need by encryption is preprocessed; at the online stage, after messages and the attribute sets are known, ciphertexts can be generated only with a small amount of simple calculation. A construction method and corresponding schemes of an ABOOKEM are provided, and the safe and universal ABOOE method for converting the one-way ABOOKEM into CCA is constructed. According to the method, safety of the ABOOE method is effectively improved on the premise that the calculated amount is not increased. According to the ABOOE method, encryption efficiency of ABE is improved, and the ABOOE method is suitable for terminal equipment of which the calculated amount is highly limited.

Description

technical field [0001] The present invention relates to Attribute-Based Online / Offline Encryption (ABOOE) methods, including ABOOE ​​methods with Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA), and moreover to mechanisms including Attribute-Based Online / Offline Key Encapsulation A construction method of (ABOOKEM) and a construction method for converting one-way ABOOKEM into ABOOE ​​with security of selected ciphertext. Background technique [0002] The Attribute-Based Encryption (ABE) mechanism was first proposed by Sahai and Waters at the Omi Conference in 2005. In this ABE, attributes are used to identify the characteristic information of the user (for example, students have attributes such as departments, majors, and student categories), and the authorization center issues private keys for them according to the attributes the user has. The encryptor uses a set of attribute public keys to The predetermined threshold value is used for encryption, and the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 马海英王占君陈建平王春明曹利王金华魏晓宁
Owner 北京未来云服科技有限公司