Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo

A privacy protection and attribute encryption technology, applied in the field of information security, which can solve the problems of cloud cloud malicious attacks, uneconomical battery consumption and communication costs, and inability to verify the correctness of converted ciphertexts.

Active Publication Date: 2015-11-25
HOHAI UNIV
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] In today's era, data in the cloud is increasingly accessed by resource-constrained wireless end users. For wireless users, computing costs and communication costs are the first factors to be considered. The cost of battery consumption and communication caused by a large number of bilinear pairing operations is uneconomical, so outsourcing part

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo
  • Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo
  • Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0085] The present invention will be further clarified below in conjunction with the drawings and specific embodiments.

[0086] The specific process of the present invention will be described below in conjunction with the drawings.

[0087] Such as figure 1 As shown, an ABE system provided by the present invention includes the following eight modules:

[0088] 1. System parameter setting module (Setup): Enter the security parameter κ, and return the system public parameter params and the master key MK.

[0089] 2. Key generation module (KeyGen): The authorization center runs a key generation algorithm to generate private keys for users. The authorization center enters the system public parameters params, a descriptive attribute set L, and calculates the private key SK associated with the user and attribute set L L .

[0090] 3. Encryption module (Encrypt): Enter the system public parameters params, message m, access strategy W, and the encryptor encrypts to obtain a ciphertext CT. O...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attribute-based encryption method and an attribute-based encryption system capable of protecting privacy and supporting user Undo. The attribute-based encryption system comprises eight modules including a Setup module, a KeyGen module, an Encrypt module, a Decrypt module, a ReKey module, a TKGen module, a TK-Encrypt module and a TK-Decrypt module. Moreover, the method provided by the invention can solve the problem of privacy protection in cloud computation, and support user Undo and safe outsourcing operations to a ciphertext. Meanwhile, a function of authentication to transformed ciphertext is provided, illegal substitution of the transformed ciphertext and adverse consequences caused by illegal substitution are prevented, and system flexibility is high.

Description

technical field [0001] The invention belongs to the field of information security, and relates to an attribute-based encryption technology, in particular to an attribute-based encryption method that supports user revocation, protects user privacy, supports data outsourcing, and supports verification of the correctness of converted ciphertexts . Background technique [0002] Today, in the information age where computers are widely used, due to the vigorous development of network technology and the concept of cloud computing, it has become a trend to store a large amount of information in digital form in public clouds and computer systems. Information is transmitted through public channels, and these systems and public channels are vulnerable to attacks and damage if they are not protected. If the theft of information is not easy to be found, the consequences will be quite serious. With the development of cloud computing technology today, people's concerns about the security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/06H04L63/10
Inventor 李继国石岳蓉陆阳张亦辰
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products