A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption

A technology of attribute-based encryption and broadcast encryption, applied in the field of cryptography in information security

Active Publication Date: 2014-11-05
BEIHANG UNIV
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] When these cryptographic systems are applied to data-driven networks (such as electronic health networks) to achieve access control of private data, a very practical problem arises: although many provably secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption
  • A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption
  • A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] See Figure 1-3 As shown, this scheme includes four modules, which are initialization module, encryption module, private key generation module and decryption module. Such as image 3 As shown, each module is executed in the order of "initialization module" → "encryption module" → "private key generation module" → "decryption module".

[0076] A kind of method of the present invention realizes broadcast encryption by the attribute base encryption of ciphertext policy, promptly realizes the method for IBBE by CP-ABE, and its implementation steps are as follows:

[0077] Module 1: Initialize the module

[0078] In this module, PKG takes system security parameter λ as input, and outputs public key PK and master key MSK. The public key PK is public, and the master key MSK is kept by PKG. The specific implementation of the module function is divided into three steps:

[0079] Step 1: PKG first inputs the system security parameter λ, and then runs the algorithm g(1 λ ), ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

There is provided a method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption. The steps of the method are as follows: in step 1, a PKG (Private Key Generator) inputs a safety coefficient of a system to output an initialization parameter; in step 2, the PKG runs a random number generation algorithm to choose a random number required for the system; in step 3, the PKG executes operation to obtain a public key and a master secret key; in step 4, an encrypting party chooses the random number and completes operation to output a part of ciphertext; in step 5, the encrypting party executes calculation according to a set of identities of decrypting users to obtain the remaining part of the ciphertext; in step 6, the PKG runs a random number generation algorithm to obtain a random parameter; in step 7, the PKG executes calculation according to the master secret key and the identity of the user to obtain a private key SKID; in step 8, a decrypting party conforming to requirement is able to execute calculation according to the private key and the ciphertext to obtain K; and in step 9, the decrypting user is able to output correct plaintext by executing calculation according to the K. According to the invention, a development cycle and system load are reduced greatly, and chosen ciphertext attack can be resisted, which ensures safety and effectiveness of the scheme.

Description

(1) Technical field: [0001] The present invention provides a method for realizing identity-based broadcast encryption by attribute-based encryption of ciphertext policy, which is referred to as a method for realizing IBBE by CP-ABE, which can be used for secure communication in data-driven networks and belongs to the field of information security. field of cryptography. (2) Technical background: [0002] In recent years, many new data-driven networks have been proposed and designed, such as social networks, wireless sensor networks, electronic health networks, etc., which provide a more flexible way for data collection. It allows data to be collected by distributed terminals for sharing by individuals or groups. For example, in the electronic health network, the data center collects and stores the patient's personal medical records so that the doctor can consult them when the patient goes to see a doctor. Some researchers, authoritative institutions, etc. may also use thes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/30
Inventor 刘建伟王志学伍前红刘巍然
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products