Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo

A privacy protection and attribute encryption technology, applied in the field of information security, which can solve the problems of cloud cloud malicious attacks, uneconomical battery consumption and communication costs, and inability to verify the correctness of converted ciphertexts.

Active Publication Date: 2015-11-25
HOHAI UNIV
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] In today's era, data in the cloud is increasingly accessed by resource-constrained wireless end users. For wireless users, computing costs and communication costs are the first factors to be considered. The cost of battery consumption and communication caused by a large number of bilinear pairing operations is uneconomical, so outsourcing part of the calculation to the cloud storage provider for operation has great economics and good system scalability and accessibility
In real life, there may be misconduct on the cloud or malicious attacks on the cloud. The correctness of the converted ciphertext cannot be verified, and the ciphertext is illegally replaced, resulting in adverse consequences.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo
  • Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo
  • Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] The present invention will be further explained below in conjunction with the accompanying drawings and specific embodiments.

[0086] The specific process of the present invention will be described below in conjunction with the accompanying drawings.

[0087] Such as figure 1 As shown, a kind of ABE system provided by the present invention comprises following eight modules:

[0088] 1. System parameter setting module (Setup): input security parameter κ, return system public parameter params and master key MK.

[0089] 2. Key generation module (KeyGen): The authorization center runs a key generation algorithm to generate a private key for the user. The authorization center inputs the system public parameters params, a descriptive attribute set L, and calculates the private key SK associated with the user and the attribute set L L .

[0090] 3. Encryption module (Encrypt): Input the system public parameters params, message m, access policy W, and the encryptor encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attribute-based encryption method and an attribute-based encryption system capable of protecting privacy and supporting user Undo. The attribute-based encryption system comprises eight modules including a Setup module, a KeyGen module, an Encrypt module, a Decrypt module, a ReKey module, a TKGen module, a TK-Encrypt module and a TK-Decrypt module. Moreover, the method provided by the invention can solve the problem of privacy protection in cloud computation, and support user Undo and safe outsourcing operations to a ciphertext. Meanwhile, a function of authentication to transformed ciphertext is provided, illegal substitution of the transformed ciphertext and adverse consequences caused by illegal substitution are prevented, and system flexibility is high.

Description

technical field [0001] The invention belongs to the field of information security, and relates to an attribute-based encryption technology, in particular to an attribute-based encryption method that supports user revocation, protects user privacy, supports data outsourcing, and supports verification of the correctness of converted ciphertexts . Background technique [0002] Today, in the information age where computers are widely used, due to the vigorous development of network technology and the concept of cloud computing, it has become a trend to store a large amount of information in digital form in public clouds and computer systems. Information is transmitted through public channels, and these systems and public channels are vulnerable to attacks and damage if they are not protected. If the theft of information is not easy to be found, the consequences will be quite serious. With the development of cloud computing technology today, people's concerns about the security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/06H04L63/10
Inventor 李继国石岳蓉陆阳张亦辰
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products