Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption

A technology of user attributes and ciphertext policies, which is applied in the field of network and information security, can solve the problems of high revocation cost, inflexibility, and inability to realize fine-grained attribute revocation, and achieve the effect of reducing workload and burden

Active Publication Date: 2014-10-22
XIDIAN UNIV
View PDF2 Cites 62 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented describes a system that allows different people who want their own personal property (such as photos) to temporarily change its appearance over time without having all involved being connected through communication channels like emails. Instead they only require certain keys from each person when needed instead of sending everything up every few minutes. By doing things rightly, these systems help save resources by allowing multiple individuals to share important assets more easily.

Problems solved by technology

This patents discusses various techniques for improving securely storing important items like passwords (Several technical solutions exist such as embedding an authentication identifier with its corresponding password) within encrypted documents stored on remote computers called Cloud Computing Platforms ("CPE"). These CPE systems allow multiple people who want to share files from each other without compromising any privacy concerns over those keys used during file exchange. Additionally, these CPE platforms provide mechanisms for creation of new tokens - values associated with specific attributes instead of just plain ones. Overall, this technology allows us to efficiently manage large amounts of sensitive data shared across diverse locations while ensuring confidentiality and protection against unauthorized access attempts.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption
  • Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption
  • Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment provides detailed implementation methods and implementation steps on the premise of the technical solution, but is not limited to this embodiment.

[0062] Such as figure 1 As shown, said a kind of encryption method based on ciphertext policy attribute that realizes timely user attribute revocation mainly includes the following steps:

[0063] Step 1, the system is established, and the system public key and master key are generated;

[0064] Step 2, the encryptor constructs an access strategy;

[0065] Step 3, the encryptor encrypts the message to generate the initial ciphertext;

[0066] Step 4, the attribute authority center generates the user private key and authorization private key;

[0067] Step 5, the cloud server constructs a path key binary tree;

[0068] Step 6, the cloud server performs proxy re-encryption, generates...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption. The method is realized by the following steps: a system is established to generate a system public key and a master key; an encipherer constructs an access strategy; the encipherer carries out encryption to generate a ciphertext; an attribute authority center generates a user private key and an authorization private key; a cloud server constructs a path secret key binary tree; the cloud server carries out proxy re-encryption and generates a re-ciphertext to realize the cancel of user attributes; and a decipher carries out decryption to obtain a plaintext. The method helps to reduce the burden of the attribute authority center, and can solve the private key updating problem corresponding to the attribute cancel quickly and efficiently; when one or some attributes of a user is cancelled, access authority for other attributes is still reserved; and the cancelling of one or some attributes of the user does not influence the access authorities of other uses to the cancelled attribute; and the method has the advantages of being capable of cancelling the user attributes in a flexible, timely, fine-grained and efficient manner.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products