Revocable key external package decryption method based on content attributes

A content attribute and key technology, applied in the field of cryptography in information security

Active Publication Date: 2015-04-01
HANGZHOU INNOVATION RES INST OF BEIJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF4 Cites 57 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the above research schemes have achieved excellent data security and privacy protection functions in one aspect, none of...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Revocable key external package decryption method based on content attributes
  • Revocable key external package decryption method based on content attributes
  • Revocable key external package decryption method based on content attributes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] Such as Figure 1-2 , The present invention is a revocable key outsourcing decryption method based on content attributes, the method is realized by five modules: a system initialization module, a private key generation module, a file encryption module, a file decryption module and a key revocation module. See figure 2 ,, combined with the flow chart, the specific implementation steps of the method are introduced as follows:

[0088] Module 1: System initialization module:

[0089] Step 1: The trusted authority (TA, Trusted Authority) inputs the system security parameter λ, and runs the algorithm Output two groups G and G whose order is a prime number p T And a bilinear mapping operation e: G×G→G T ;

[0090] Step 2: Next, run the random number generation algorithm, randomly select a generator g in the G group, two random elements u, f, and Z in the G group p An element α in the domain.

[0091] Step 3: The trusted authority selects a collision-resistant hash fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a revocable key external package decryption method based on content attributes. For a trusted authority, 1, initialization is carried out, and system parameters are output; 2, a random number generation algorithm operates; 3, a collision-resistant Hash function is selected, and the Hash value is calculated; 4, a public key and a main key are calculated; 5, the random number is selected, and exponentiation calculation and multiplication are carried out; 6, the collision-resistant Hash function operates, the exponentiation operation is carried out, and a decryption key is obtained. For a data holder, 7, AES data encryption is carried out; 8, an access control matrix is generated; 9, a random number is selected, and an inner product is calculated; 10, multiplication, exponentiation and exclusive-or operation is operated, and ciphertexts are obtained. For a decryption operator, 11, a decryption request and a transformation key are sent. For a mobile storage serve provider, 12, CT2 is sent to an external package decryption agency. For the external package decryption agency, 13, the transformation key is utilized, and the transformation ciphertext is calculated. For the decryption operator, 14, a conversation key is obtained through calculation; 15, AES data decryption is carried out.

Description

(1) Technical field: [0001] The present invention designs a revocable key outsourcing decryption method based on content attributes, which can effectively revoke leaked user keys in a mobile cloud storage environment, and can protect user privacy to the greatest extent and reduce the decryption calculation cost of mobile devices, which belongs to information security In the field of cryptography technology. (2) Technical background: [0002] With the development of communication technology and the widespread popularization of mobile devices, people have changed their previous information processing mode of relying on desktops and laptops to develop more convenient and efficient mobile cloud computing services. For the purpose of saving storage space, more and more mobile users choose to upload data to third-party server-side storage. In the mobile cloud storage model, with the help of communication networks and mobile devices, users can enjoy seamless access to cloud data a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 伍前红邓桦周云雅秦波刘建伟
Owner HANGZHOU INNOVATION RES INST OF BEIJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products