Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method and system based on attributes

An encryption method and attribute technology, applied in the field of information security, can solve the problem of leaking user privacy and other issues

Inactive Publication Date: 2015-02-18
HOHAI UNIV
View PDF5 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] From the above process, it can be seen that although the attribute-based encryption system of the ciphertext policy can provide secure access control in the cloud, the access policy is sent to the recipient together with the ciphertext, and the recipient will access the To obtain relevant and effective information in the policy, any intermediate user can obtain the information of the list of potential recipients through the access policy, thus leaking the privacy of the user, which is not beneficial to some encryption operators who are engaged in commercial activities or want to protect the access policy things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and system based on attributes
  • Encryption method and system based on attributes
  • Encryption method and system based on attributes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings:

[0081] 1. Description of mathematical knowledge used in the present invention:

[0082] 1. Bilinear Pairing

[0083] Here is a brief introduction to the basic definition of bilinear mapping and the properties it needs to satisfy.

[0084] Let G, G T Are two multiplicative cyclic groups of order p, where p is a prime number and g is the generator of G. Define the bilinear mapping on the two groups as: e:G×G→G T , And satisfy the following properties:

[0085] (1) Bilinearity: e(g a ,g b )=e(g,g) ab , For all g∈G,a,b∈Z p Are all established.

[0086] (2) Non-degeneration: e(g,g)≠1.

[0087] (3) Computability: There is an effective algorithm to calculate e(g,g), which is true for all g∈G.

[0088] 2. Access Structure

[0089] Let {P 1 ,P 2 ,...,P n } Is the set of n participants. Assume Represents a set composed of a subset of the participant set...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption system based on attributes. The encryption system comprises a system parameter setting module, a key generation module, an encryption module, a decryption module, a cryptograph retrieval module, a re-encryption key generation module, a re-encryption module and a private key re-generation module, wherein the system parameter setting module is used for generating system public parameters, the key generation module is used for generating private keys of users for decrypting messages according to attribute sets of the users; the encryption module is used for encrypting the messages; the decryption module is used for decrypting the messages, the cryptograph retrieval module is used for retrieving the cryptographs; the re-encryption key generation module is used for generating re-encryption keys and updating the cryptographs and the private keys; the re-encryption module is used for re-encrypting the messages on the basis of the original cryptographs; the private key re-generation module is used for updating the private keys of the users. The invention further discloses an encryption method based on the attributes. By the encryption system and method based on the attributes, the problem of privacy protection during cloud computing can be solved, attribute withdrawal and safety retrieval of the cryptographs are supported, and the encryption system is high in flexibility.

Description

Technical field [0001] The invention relates to an attribute-based encryption technology, in particular to an attribute-based encryption method that can search for ciphertexts, support attribute revocation, and protect user privacy. It can be used for fine-grained access control in a cloud computing environment. Information security field. Background technique [0002] Today, in the information age where computers are widely used, due to the vigorous development of network technology and the concept of cloud computing, a large amount of information is stored in digital form in public clouds and computer systems has become a trend. Information is transmitted through public channels, and these systems and public channels are very fragile without being guarded, and are relatively vulnerable to attacks and damage. If the theft of information is not easy to be discovered, the consequences are quite serious. With the increasing development of cloud computing technology today, people’s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30
CPCH04L63/0428H04L63/0442H04L67/10
Inventor 李继国石岳蓉陆阳张亦辰王瑶李磊沙凤杰姚伟林啸南张全领汪海萍赵晶晶郭俊赵雪霞
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products