Unlock instant, AI-driven research and patent intelligence for your innovation.

Property base encryption method for ciphertext policy with privacy protection function and without central mechanisms

An attribute-based encryption and central organization technology, which is applied in the field of attribute-based encryption of ciphertext policy, can solve the problems of leaking user identity information, not considering the privacy of user attributes, and the central organization cannot join or leave the system, etc.

Active Publication Date: 2014-11-05
INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are some defects in the existing schemes: first, multiple central agencies need to be united to initialize the system; second, the central agencies cannot dynamically join or leave the system; third, only consider the privacy of the user's global identifier, and do not consider user attributes privacy concerns
It is worth noting that some sensitive attributes can also leak user identity information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Property base encryption method for ciphertext policy with privacy protection function and without central mechanisms
  • Property base encryption method for ciphertext policy with privacy protection function and without central mechanisms
  • Property base encryption method for ciphertext policy with privacy protection function and without central mechanisms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with the accompanying drawings.

[0027] An attribute-based encryption method with a privacy-preserving ciphertext policy without a central authority, which includes the following five stages:

[0028] (1) Initialization stage: Assume that there are N central agencies in the system {A 1 ,A 2 ,...,A N}. For i ∈ {1,2,…,N}, each central authority A i Manage a set of properties Apply the bilinear group generation algorithm GG(1 k )→(e,p,G,G τ ). Suppose g, η and h are the generators of the cyclic group G. The public parameters of the system are params=(e,p,g,h,η,G,G τ ). Among them, p is a prime number, Z p is a finite field modulo p, a i,j ∈ Z p . Algorithm GG(1 k ) Enter a security parameter 1 k , output a bilinear group of order p (e,G,G τ ) satisfies e:G×G→G τ .

[0029] (2) Central organization establishment stage: For i∈{1,2,…,N}, central organization A i calculate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a property base encryption method for a ciphertext policy with a privacy protection function and without central mechanisms. The property base encryption method includes an initialization stage, a central mechanism building stage, an encryption stage, a secrete key generation stage and a decryption stage. The central mechanisms can dynamically join or leave a system, and the system does not need to be reinitialized or a secret key does not need to be regenerated. In the message encryption process, an encipherer can select an access control structure for each central mechanism so that only users with properties meeting all the access control structures in a cyphertext can encrypt the cyphertext, and a plaintext can be obtained. According to the property base encryption method, the property of the universe identifiers and the properties of the users can be protected, and in addition, the access control structures can be flexible. The property base encryption method with the privacy protection function and without the central mechanisms is strong.

Description

technical field [0001] The invention belongs to the field of computer security, and in particular relates to an attribute-based encryption method with a privacy-protected ciphertext policy without a central organization. Background technique [0002] Because it can provide sufficient storage space and efficient management services, cloud storage technology is being used by more and more users. However, data security has become one of the most concerned issues for users in cloud storage. In practical applications, for a certain confidential data, users usually use some descriptive attributes to describe the conditions for accessing the data. Although traditional encryption mechanisms can be used to protect the confidentiality of data, they cannot express flexible access control structures. [0003] Because of the ability to express flexible access control structures, attribute-based encryption has attracted widespread attention since it was proposed. In an attribute-based ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
Inventor 韩金广曹杰伍之昂毛波卜湛
Owner INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER