Outsourcing decryption method of attribute-based encryption based on ciphertext policy

A technology of attribute encryption and ciphertext, which is applied in the field of outsourced decryption of attribute-based encryption based on ciphertext strategy, and can solve problems such as occupying large network bandwidth resources

Inactive Publication Date: 2014-09-03
HANGZHOU NORMAL UNIVERSITY
View PDF2 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, every time a user needs to outsource decryption, the conversion key needs to be transmitted to a third party. When the numb

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Outsourcing decryption method of attribute-based encryption based on ciphertext policy
  • Outsourcing decryption method of attribute-based encryption based on ciphertext policy
  • Outsourcing decryption method of attribute-based encryption based on ciphertext policy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solutions of the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. The following examples are implemented on the premise of the technical solutions of the present invention, and detailed implementation methods and processes are given, but the protection scope of the present invention is not limited to the following examples.

[0034] In order to better understand the method proposed in this embodiment, a corporate encrypted file sharing event is selected. In the event, there is a data owner, two access users (user A has the attributes of "technical department and manager"; user B has the attributes of "personnel department" and "supervisor") and a shared file m.

[0035] As the method structural diagram of the present invention ( figure 1 ), the specific implementation steps of this embodiment are as follows:

[0036] 1. System initialization

[0037] The system (the system refers ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a highly-efficient safe outsourcing decryption method based on the attribute encryption in mobile cloud computing environment. The method comprises the following steps: system initialization; a data owner encrypting a file and uploading the file to a cloud service provider; an authorization organization generating secret keys; a third party transforming ciphertexts; and a mobile terminal user decrypting the file. According to the method, targeted for the mobile cloud computing environment, by utilizing a ciphertext policy attribute-based encryption shared data method, according to the requirement of limited operation and storage capacity of a mobile terminal, and under the premise of guaranteeing data security, a portion of complex decryption tasks are outsourced to the third party; and by utilizing outsourcing decryption, secret key decomposition technique and matching algorithm, unnecessary bilinearity pairing operation is reduced, and a reliable method is provided for the mobile terminal to carry out rapid decryption.

Description

technical field [0001] The present invention relates to an efficient and safe outsourced decryption method based on attribute encryption in a mobile cloud computing environment, and specifically relates to the use of attribute-based encryption mechanism and key decomposition technology to target shared ciphertext data based on attribute encryption in a cloud computing environment. Part of the decryption calculation is outsourced to a third party, thereby shortening the length of the key at the mobile terminal and reducing the decryption time, which belongs to the field of cloud computing security technology. Background technique [0002] With the widespread use of mobile terminals and the development of cloud computing technology, users have more and more demands for data sharing and processing in a cloud storage environment using mobile terminals. The ensuing data security, privacy leakage and other issues have also become one of the main obstacles to the development of clo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/08
Inventor 夏莹杰刘雪娇陈瑶蒋莎莎
Owner HANGZHOU NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products