Unlock instant, AI-driven research and patent intelligence for your innovation.

A self-authorized cp-abe system and method

A CP-ABE and relationship technology, applied in the field of information security, can solve the problems of CP-ABE system privacy leakage, damage to the rights and interests of content applicants, leakage of content applicant attribute information, etc., and achieve the effect of avoiding privacy risks

Inactive Publication Date: 2017-05-17
PEKING UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For this type of application, the CP-ABE system of centralized authorization or distributed authorization is not suitable, because in this type of application, the complex and flexible relationship between users is formed spontaneously between users, and a single authorizer (or several authorizers) ) is not suitable for establishing such a complex and flexible relationship between users and for authorizing users
[0031] 2. The CP-ABE system with centralized authorization or distributed authorization brings a great risk of privacy leakage
[0033] (2) The attribute information of the content applicant is leaked to the authorizer
Authorizers can provide this information to themselves or illegal users and use it to achieve their own purposes and damage the rights and interests of content applicants

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A self-authorized cp-abe system and method
  • A self-authorized cp-abe system and method
  • A self-authorized cp-abe system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0141] The present invention will be further described in detail below in combination with specific implementations.

[0142] Retrofit example:

[0143] 1. Transformation of the algorithm of the document "John Bethencourt, Amit Sahai, and Brent Waters. Ciphertxt-Policy Attribute-Based Encryption. In IEEE Symposium on Security and Privacy, may2007, pp.321-334".

[0144] The modified algorithm is as follows:

[0145] (1) Establish:

[0146] Input: security parameter λ

[0147] Output: public parameters of the system, public and private keys of participants and other public / secret parameters.

[0148] Algorithm Description:

[0149] Establish the global public parameters of the system: establish an algorithm to generate (q, G, G T , e), where q is a prime order of λ bits, G and G T are two multiplicative cyclic groups of order q, and g is A generator on , e is A bilinear map on , the next step is to choose the hash function H: {0, 1} * →G.

[0150] Each participant i ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a self-authorized CP-ABE system and method. The method comprises the steps that (1), a message M is encrypted by any participator i through the CP-ABE method, the public key of the user is adopted in the encryption process to obtain and issue the CT, and each participator side comprises a building module, an encryption module, a decryption secret key generating module and a decryption module; (2), when a participator j having the friend relationship with the participator i applies for obtaining a decryption secret key to the participator i, the participator i authorizes the participator j, and the decryption secret key is generated and sent to the participator j according to the attribute of the participator j relative to the participator i; (3), the participator j decrypts the CT by using the received decryption secret key to obtain the message M. According to the system and method, each participator manages and controls the friend relationship of his own and generating and issuing of the decryption secret key by himself, the application of forming the complex and flexible relationship between the participators can be supported, and the privacy of the participators is prevented from being leaked.

Description

technical field [0001] The invention relates to a self-authorized CP-ABE system and method, belonging to the technical field of information security. Background technique [0002] Existing Attribute Based Encryption (ABE) systems have four basic roles: [0003] (1) Content owner [0004] Content can contain any digital information. Content owners encrypt and publish their own content. The encryption process is divided into two stages: In the first stage, content owners encrypt their digital content using symmetric encryption algorithms. In the second stage, the content owner uses the ABE algorithm to encrypt the message containing the symmetric key corresponding to the encrypted content and the access control structure information related to the attribute set. [0005] (2) Content applicants [0006] Content applicants can apply for content, obtain the content, and decrypt the message with their own decryption key. [0007] A content owner and a content applicant are c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/3073
Inventor 方跃坚沈晴霓杨雅辉吴中海
Owner PEKING UNIV