Unlock instant, AI-driven research and patent intelligence for your innovation.

Attribute-Based Encryption Method for Central Authority-Free Ciphertext Policy with Privacy Preservation

A technology of attribute-based encryption and central organization, applied in the field of attribute-based encryption of ciphertext policy, it can solve the problems that the central organization cannot join or leave the system, leak user identity information, and only consider the privacy of user global identifiers.

Active Publication Date: 2017-06-16
INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are some defects in the existing schemes: first, multiple central agencies need to be united to initialize the system; second, the central agencies cannot dynamically join or leave the system; third, only consider the privacy of the user's global identifier, and do not consider user attributes privacy concerns
It is worth noting that some sensitive attributes can also leak user identity information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-Based Encryption Method for Central Authority-Free Ciphertext Policy with Privacy Preservation
  • Attribute-Based Encryption Method for Central Authority-Free Ciphertext Policy with Privacy Preservation
  • Attribute-Based Encryption Method for Central Authority-Free Ciphertext Policy with Privacy Preservation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings.

[0026] An attribute-based encryption method with a privacy-preserving ciphertext policy without a central authority, which includes the following five stages:

[0027] (1) Initialization stage: Assume that there are N central agencies in the system {A 1 ,A 2 ,...,A N}. For i ∈ {1,2,…,N}, each central authority A i Manage a set of properties Apply the bilinear group generation algorithm GG(1 k )→(e,p,G,G τ ). Suppose g, η and h are the generators of the cyclic group G. The public parameters of the system are params=(e,p,g,h,η,G,G τ ). Among them, p is a prime number, Z p is a finite field modulo p, a i,j ∈ Z p . Algorithm GG(1 k ) Enter a security parameter 1 k , output a bilinear group of order p (e,G,G τ ) satisfies e:G×G→G τ .

[0028] (2) Central organization establishment stage: For i∈{1,2,…,N}, central organization A i calculate for calc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attribute-based encryption method with a privacy-protected ciphertext policy without a central organization, including an initialization stage, a central organization establishment stage, an encryption stage, a secret key generation stage and a decryption stage. Central authorities can dynamically join or leave the system without reinitializing the system or regenerating keys. When encrypting a message, the encryptor can select an access control structure for each central organization, so that only users whose attributes satisfy all access control structures in the ciphertext can decrypt the ciphertext and obtain the plaintext. This method can not only protect the privacy of the user's global identifier and attribute, but also realize a flexible access control structure. The invention is a strong attribute-based encryption method with privacy protection and no central authority.

Description

technical field [0001] The invention belongs to the field of computer security, and in particular relates to an attribute-based encryption method with a privacy-protected ciphertext policy without a central organization. Background technique [0002] Because it can provide sufficient storage space and efficient management services, cloud storage technology is being used by more and more users. However, data security has become one of the most concerned issues for users in cloud storage. In practical applications, for a certain confidential data, users usually use some descriptive attributes to describe the conditions for accessing the data. Although traditional encryption mechanisms can be used to protect the confidentiality of data, they cannot express flexible access control structures. [0003] Because of the ability to express flexible access control structures, attribute-based encryption has attracted widespread attention since it was proposed. In an attribute-based ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
Inventor 韩金广曹杰伍之昂毛波卜湛
Owner INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER