A Ciphertext Policy-Based Attribute Encryption Method Realizing Instant User Attribute Revocation

A technology of user attributes and ciphertext policies, which is applied in the field of network and information security, can solve the problems of high revocation cost, inflexibility, and inability to realize fine-grained attribute revocation, and achieve the effect of reducing workload and burden

Active Publication Date: 2017-12-08
XIDIAN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above methods all have their own shortcomings. The cost of revocation is high, and they are not flexible enough to achieve timely and fine-grained attribute revocation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Ciphertext Policy-Based Attribute Encryption Method Realizing Instant User Attribute Revocation
  • A Ciphertext Policy-Based Attribute Encryption Method Realizing Instant User Attribute Revocation
  • A Ciphertext Policy-Based Attribute Encryption Method Realizing Instant User Attribute Revocation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment provides detailed implementation manners and implementation steps based on the technical solution, but is not limited to this embodiment.

[0062] Such as figure 1 As shown, the ciphertext-based policy attribute encryption method for realizing timely user attribute revocation mainly includes the following steps:

[0063] Step 1. The system is established, and the system public key and master key are generated;

[0064] Step 2. The encryptor constructs an access strategy;

[0065] Step 3. The encryptor encrypts the message and generates an initial ciphertext;

[0066] Step 4. The attribute authority center generates the user private key and the authorized private key;

[0067] Step 5. The cloud server constructs a binary tree of path keys;

[0068] Step 6, the cloud server performs proxy re-encryption, generates a re-cipher text, and realizes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption. The method is realized by the following steps: a system is established to generate a system public key and a master key; an encipherer constructs an access strategy; the encipherer carries out encryption to generate a ciphertext; an attribute authority center generates a user private key and an authorization private key; a cloud server constructs a path secret key binary tree; the cloud server carries out proxy re-encryption and generates a re-ciphertext to realize the cancel of user attributes; and a decipher carries out decryption to obtain a plaintext. The method helps to reduce the burden of the attribute authority center, and can solve the private key updating problem corresponding to the attribute cancel quickly and efficiently; when one or some attributes of a user is cancelled, access authority for other attributes is still reserved; and the cancelling of one or some attributes of the user does not influence the access authorities of other uses to the cancelled attribute; and the method has the advantages of being capable of cancelling the user attributes in a flexible, timely, fine-grained and efficient manner.

Description

Technical field [0001] The invention relates to the field of network and information security, and relates to encrypted data access control technology, in particular to a ciphertext strategy attribute encryption method for realizing timely user attribute revocation. Background technique [0002] Based on attribute encryption, it belongs to a public key encryption mechanism. It is oriented to a group, not a single user. It allows users to use attributes to encrypt and decrypt messages, which can achieve efficient one-to-many broadcast encryption and fine-grained access control. According to the ciphertext and key expression and application scenarios, it is divided into two types: the attribute encryption of the key strategy and the attribute encryption of the ciphertext strategy. Among them, in the attribute encryption based on the ciphertext strategy, the user's private key is related to the attribute. The encryptor formulates the access policy and determines which attributes th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/08
Inventor 刘振华俎龙辉李娟娟李宾
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products