Distributed access control method for attribute-based encryption

An access control and attribute encryption technology, which is applied in the fields of data security and privacy protection, can solve the problems of not considering user revocation, not considering efficient decryption, etc.

Active Publication Date: 2015-09-09
CHONGQING UNIV OF POSTS & TELECOMM
View PDF8 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Documents CN201210389845.5, CN201310132586.2, and CN201410330696.4 all considered the problem of user revocation, but did not consider efficient decryption, while CN201410055341.9 proposed an outsourced decryption method based on CP-ABE, which realized efficient decryption , but does not consider the issue of user withdrawal
CN201310647570.5 proposes a multi-authoritative CP-ABE method applied to the cloud environment. This method can realize efficient decryption and user revocation, but when performing user revocation, this method not only needs to obtain the private key of the user containing the revocation attribute. To update, it is also necessary to update the ciphertext containing the revocation attribute in the access structure, and considering the massive data stored in the cloud environment, this user revocation method will bring huge overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed access control method for attribute-based encryption
  • Distributed access control method for attribute-based encryption
  • Distributed access control method for attribute-based encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings; it should be understood that the preferred embodiments are only for illustrating the present invention, rather than limiting the protection scope of the present invention.

[0077] The distributed access control mechanism based on attribute encryption provided by the present invention comprises the following steps, see figure 2 :

[0078] S1: System initialization, generate system public parameters, public / private key pair of TP and public / private key pair of each attribute, see image 3 ;

[0079] Further, the step S1 includes the following steps:

[0080] S11: TP initialization, input security parameter λ, generate system public parameters and TP public / private key pair, where system public parameters include two bilinear groups G with order p 1 ,G 2 , G 1 Generator g and bilinear map e:G in 1 ×G 1 →G 2 , TP's public / private key pair is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a distributed access control method for attribute-based encryption, and mainly aims to solve the problems of security and privacy protection of massive data in a cloud environment. A multi-authority ciphertext-policy attribute-based encryption (CP-ABE) mechanism is provided on the basis of CP-ABE. According to the mechanism, the workload of a single authority is shared with a plurality of authorities, and efficient outsourcing decryption, user revocation and dynamic join and exit supporting attribute authority (AA) can be realized. Through adoption of an access control mechanism provided by the invention, efficient, distributed, extensible and fine-granularity access control can be realized while the security and privacy of the massive data are protected.

Description

technical field [0001] The invention relates to the field of data security in computer science and information security discipline, in particular to data security and privacy protection in a cloud computing environment. Background technique [0002] With the rapid development of computer technology, the Internet and wireless networks, a large amount of data generated every day is stored in digital form on computers. Cloud computing technology provides an effective solution for the storage and processing of massive data. However, when users store their data in a third-party cloud server, considering that the third-party cloud server is not completely trusted and users generally only allow authorized visitors to access their data, the security and Privacy faces great challenges, such as users' personal preferences and circle of friends on social networking sites, personal emails on email servers, and so on. When these servers are hacked, users' sensitive data will be leaked,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/08
CPCH04L9/3073
Inventor 肖敏王明昕
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products