Attribute-based hybrid encryption method capable of tracing leaked secret key

A hybrid encryption and traceable technology, applied in the field of cryptography in information security, can solve problems such as data insecurity, achieve the effects of improving system efficiency, saving storage space, and ensuring data security

Active Publication Date: 2014-11-26
BEIHANG UNIV
View PDF4 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] It is not foolproof to rely solely on traditional encryption methods to protect data. The attribute-based encryption method issues user private keys corresponding to the attribute set to decrypt files. Once the user's private key is leaked for some reason, the The data that can be decrypted by the private key is not safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based hybrid encryption method capable of tracing leaked secret key
  • Attribute-based hybrid encryption method capable of tracing leaked secret key
  • Attribute-based hybrid encryption method capable of tracing leaked secret key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0119] The invention is an attribute-based hybrid encryption method with traceable leaked key, which is realized by five modules: a system initialization module, a user input module, a document creation module, a document access module and a digital evidence acquisition module. The system architecture diagram of the operation of the attribute-based hybrid encryption method with traceable leaked keys is shown in figure 1 Shown, the flowchart block diagram of the method of the present invention sees figure 2 As shown, combined with the flow chart, the specific implementation steps of the method are introduced as follows:

[0120] The invention discloses an attribute-based hybrid encryption method with traceable leaked keys. The method is as follows:

[0121] Module 1: System initialization module:

[0122] Step 1: The trusted authority (TA, Trusted Authority) inputs the system security parameter λ, and runs the algorithm Output two groups whose order is a prime number p a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is an attribute-based hybrid encryption method capable of tracing a leaked secret key. The method comprises the following steps: a trusted authority: 1, inputting a coefficient lambda, and outputting a system parameter; 2, running a randomized number generation algorithm; 3, selecting one anti-bump Hash function, and calculating a Hash value; 4, running a fingerprint code generation algorithm GenFC; 5, calculating a bilinear pair exponentiation operation; 6, distributing a fingerprint code to a user, and specifying an attribute set S; 7, running the randomized number generation algorithm, multiplication and exponentiation operation; and 8, embedding the fingerprint code in a user private key; a data holder: 9, carrying out AES data encryption; 10, generating an access control matrix; 11, running an attribute-based hybrid encryption algorithm Encapsulate, and encrypting an AES session secret key; and 12, running a bilinear pair and multiplication and division operation to obtain a session secret key; a data user: 13, running an AES data decryption algorithm; and the trusted authority: 1*, searching for an adaptability code word; 2*, calculating pj and Z; and 3, calculating a weight sum, and outputting a set C.

Description

(1) Technical field: [0001] The invention relates to an attribute-based hybrid encryption method with traceable leaked keys, which can realize user key security management in a cloud storage environment, and use fingerprint code technology to effectively track users who leaked keys when data is illegally accessed Identity belongs to the field of cryptography in information security. (2) Technical background: [0002] With the introduction of the concept of cloud computing, more and more computer users deliver services such as data storage and information processing to the existing network, and obtain the required resources in an on-demand and easy-to-expand manner, such as hardware, platform, software, etc. Wait. Cloud storage is a kind of cloud computing service. Through cluster application, grid technology or distributed file system and other functions, a large number of different types of storage devices in the network are combined to work together through application so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/32H04L29/08G06F21/32
Inventor 伍前红邓桦周云雅刘建伟秦波
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products