Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

CP-ABE-based fixed ciphertext length proxy re-encryption system and method in cloud computing

A CP-ABE, fixed ciphertext length technology, applied in the field of fixed ciphertext length proxy re-encryption system, can solve problems such as data information leakage

Active Publication Date: 2015-04-29
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, many cloud service providers (Cloud Service Providers, CSPs) are not completely trustworthy, and they may hand over user data to third parties without the user's permission, resulting in data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CP-ABE-based fixed ciphertext length proxy re-encryption system and method in cloud computing
  • CP-ABE-based fixed ciphertext length proxy re-encryption system and method in cloud computing
  • CP-ABE-based fixed ciphertext length proxy re-encryption system and method in cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The invention will be described in further detail below in conjunction with the accompanying drawings.

[0077] Such as figure 1 As shown, a fixed ciphertext length proxy re-encryption system based on CP-ABE in cloud computing, the system includes an initialization module, a private key generation module, a file encryption module, a re-encryption key generation module, a ciphertext re-encryption module, File decryption module.

[0078] Initialization module: the private key generation center generates public parameters and the system master key, the public parameters are made public, and the master key is kept by the private key generation center itself;

[0079] Private key generation module: the private key generation center generates private keys for new users who join the system, and distributes them to users through a secure channel;

[0080] File encryption module: the owner of the data file, that is, the owner, encrypts the data file so that the user can safely...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a CP-ABE-based fixed ciphertext length proxy re-encryption system and method in cloud computing. By the adoption of the method, efficient safe access and sharing of a data file in the cloud computing environment are achieved. According to the method, on one hand, the proxy re-encryption technology is adopted for ciphertext conversion so that a ciphertext which can be decrypted by an authorizer can be converted into a ciphertext which can be decrypted by an authorized person, to be specific, after a file of a data owner is encrypted and uploaded to a cloud proxy server, under the condition that the authorizer is not available, the cloud proxy server re-encrypts the encrypted file, and the authorized person can acquire a plaintext through decryption with a private key of the authorized person after acquiring the re-encrypted file from the cloud proxy server, so that safe access and sharing of data are guaranteed; on the other hand, during ciphertext encryption, the CP-ABE-based fixed ciphertext length algorithm is adopted for ciphertext computing, so that the length of the ciphertext is fixed and does not increase along with the increase of the number of attributes, and then computing expenses are effectively reduced.

Description

technical field [0001] The invention relates to a CP-ABE-based proxy re-encryption system and method for fixed ciphertext length in cloud computing, belonging to the technical field of cloud computing. Background technique [0002] Cloud computing is a dynamic and easy-to-expand method that usually provides virtualized resource computing through the Internet. By transferring computing and storage responsibilities from the local to the cloud, cloud computing services can save users a lot of costs and have broad application prospects. It has become a hot direction for the application of next-generation Internet technology. Since a large amount of data generated by cloud computing services is usually in a domain uncontrollable by users, security has always been the primary consideration for enterprises to implement cloud computing, and security technology has become an important research content of cloud computing services. At present, many cloud service providers (Cloud Servi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0485H04L67/10H04L9/3073
Inventor 陈燕俐李婉珺
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products