Unlock instant, AI-driven research and patent intelligence for your innovation.

CP-ABE method for generating security decryption secret key

A CP-ABE and decryption key technology, which is applied to secure communication devices and key distribution, can solve problems such as not supporting outsourced decryption

Inactive Publication Date: 2014-11-12
PEKING UNIV
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(2) Does not support outsourced decryption
[0024] Disadvantages of the existing outsourced decryption methods: users need to generate random keys to process the decryption key before sending it to a third party. This process generates computational overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CP-ABE method for generating security decryption secret key
  • CP-ABE method for generating security decryption secret key
  • CP-ABE method for generating security decryption secret key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] The present invention is described in further detail below in conjunction with specific examples.

[0078] Method of the present invention is to the transformation process of CP-ABE algorithm:

[0079] For the CP-ABE algorithm that meets the following conditions, the SK-CP-ABE algorithm can transform this algorithm to form a new algorithm: There is no description of outsourcing decryption in this CP-ABE algorithm.

[0080] For the CP-ABE algorithm that satisfies the above conditions The general process of transformation is described as follows (only the modified part is described):

[0081] 1. Establish

[0082] Input: Security parameter λ.

[0083] Output: public parameters of the system, public and private keys of the content requester, public / secret parameters of the authorizer.

[0084] In the original CP-ABE algorithm, among the global parameters, is a multiplicative cyclic group based on elliptic curves with order p and generator g. CP-ABE Algorithm Amon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a CP-ABE method for generating a security decryption secret key. The method includes the steps that firstly, an authorizing person establishes public / secret parameters of his / her own according to security parameters, and meanwhile a content applicant establishes public and private keys and other public / secret parameters of his / her own; secondly, a content owner encrypts a message M by means of the CP-ABE algorithm according to the public parameters such as a public key of the authorizing person to obtain a cipher text CT; thirdly, the content applicant applies to the authorizing person for a decryption secret key, the authorizing person generates the decryption secret key according to the properties of the content applicant, the public key information of the content applicant is embedded in the decryption secret key when the decryption secret key is generated, and then the decryption secret key is sent to the content applicant; fourthly, the content applicant obtains the cipher text CT of the message M and then decrypts the cipher text CT through the private key of his / her own and the decryption secret key to obtain the message M. The CP-ABE method is quite small in expense and high in security, and the decryption secret key can be directly transmitted online.

Description

technical field [0001] The invention relates to a CP-ABE method for generating a safe decryption key, which belongs to the technical field of information security. Background technique [0002] Existing Attribute Based Encryption (ABE) systems have four roles: [0003] (1) Content owner [0004] Content can contain any digital information. Content owners encrypt and publish their own content. The encryption process is divided into two stages: In the first stage, content owners encrypt their digital content using symmetric encryption algorithms. In the second stage, the content owner uses the ABE algorithm to encrypt the message containing the metadata of the content and the symmetric key information corresponding to the encrypted content. [0005] (2) Content applicants [0006] Content applicants can apply for content, obtain the content, and decrypt the content with their own decryption key. [0007] (3) Authorizer [0008] The authorizer can authorize the content a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3073
Inventor 方跃坚沈晴霓杨雅辉吴中海
Owner PEKING UNIV