Ciphertext poly attribute base encryption method having efficient attribute revocation capability

A technology of attribute-based encryption and ciphertext strategy, which is applied in the field of information security and can solve the problems of not meeting actual needs, tediousness, low revocation efficiency, etc.

Active Publication Date: 2015-11-18
HOHAI UNIV
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, most of the existing attribute-based encryption methods are cumberso

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext poly attribute base encryption method having efficient attribute revocation capability
  • Ciphertext poly attribute base encryption method having efficient attribute revocation capability
  • Ciphertext poly attribute base encryption method having efficient attribute revocation capability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0073] Such as figure 1 and figure 2 As shown, the specific process of this embodiment is as follows:

[0074] Step 1. System establishment

[0075] The attribute authority AA randomly selects a set of parameters α and β from the public key function database, including two multiplicative cyclic groups G and G whose order is a prime number p T , the generator g of the group G and the bilinear pairing map e: G×G→G T . Among them, the generator g is:

[0076] g=4825753236114302700181009551893401628723199415732972015970622054593498921292879986485027569312907193857799469116963683969768920235934912260481192099662160,4048850100117591308690978073403290894218008271572038432682891321098549039994467134474260108405016782650931484816763740889273827461896634534759269691983847,0

[0077] According to the selected parameters α and β, AA generates the system public parameters PK and the master private key MK, and makes the system public parameters PK public and keeps the master private k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a ciphertext poly attribute base encryption method having an efficient attribute revocation capability. The method successively comprises the following steps: (1) system establishment, (2) attribute administrator establishment, (3) user private key generation, (4) encryption, (5) decryption, (6) attribute administrator upgrading, (&)user upgrading, and (8) re-encryption. The method has the advantages of less users related in the revocation process, small revocation cost, high revocation efficiency and the like.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a ciphertext policy attribute-based encryption method with efficient attribute revocation. Background technique [0002] As a new cryptographic primitive, attribute-based encryption has the property of one-to-many encryption and can be used for fine-grained access control. Attribute-based encryption methods mainly include two types, which are ciphertext-policy attribute-based encryption methods and key-policy attribute-based encryption methods. In the ciphertext policy attribute-based encryption method, the ciphertext is associated with an access structure, and the user's private key is associated with an attribute set. Only when the attribute set associated with the private key satisfies the access structure of the ciphertext can the user be able to decrypt the encryption correctly. arts. The key policy attribute-based encryption method is just the opposite of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06H04L29/08
Inventor 李继国姚伟张亦辰
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products