Attribute Encryption Method Based on Reversible Partial Authoritative Key Strategy Based on Multilinear Mapping

An attribute encryption, multi-linear technology, applied in the field of information security

Active Publication Date: 2019-09-17
深圳天通信息科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an attribute encryption method based on a revocable sub-authoritative key strategy based on multi-linear mapping, which solves the problem in the prior art that when a single attribute of a user is revoked, all attributes of non-users are simultaneously revoked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute Encryption Method Based on Reversible Partial Authoritative Key Strategy Based on Multilinear Mapping
  • Attribute Encryption Method Based on Reversible Partial Authoritative Key Strategy Based on Multilinear Mapping
  • Attribute Encryption Method Based on Reversible Partial Authoritative Key Strategy Based on Multilinear Mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be described in detail below in combination with specific embodiments.

[0057] The attribute encryption method based on the revocable sub-authoritative key strategy of multi-linear mapping is characterized in that it is specifically implemented according to the following steps:

[0058] Step 1. System parameter initialization:

[0059] The process is assuming that there are m attributes in the system, denoted as {1,...,m}, the maximum number of revoked users in the revocation list is n, the ID of the user, and the revocation list R j , where R j Indicates that the attribute ω is revoked j The user's identity list, divided into two cases or ID ∈ R j , ω is the attribute set, and the message is The access policy is transformed into a matrix (M, ρ) through the linear secret sharing technique LSSS, and it is implemented according to the following steps:

[0060] Step (1.1), let G 1 , G k-1 , G k is a group whose order is a prime number...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attribute encryption method based on multi-linear mapping and achieving a strategy of secret key revocation in an authority separating way, which is provided for single attribute revocation of a user. The user can finish a decryption process only when a cryptograph attribute set satisfies the secret key strategy of the user. Specifically, an authority center makes subordinate authorities. Each subordinate authority commands a main secret key of its own and participates in a public parameter establishing process. An assess strategy is converted into an access structure according to a linear secret sharing algorithm. User private keys under corresponding access structures are generated. According to the attribute set and a known revocation list, information encryption is performed. Whether the user is in the revocation list is further judged. A decryption process is finished. In consideration of known private keys and users, a tracking algorithm is established to judge the relevance of users and private keys. By means of the method provided in the invention, the problem that all attributes of non-users are canceled during a single user attribute revocation process is solved. The relevance of users and private keys is verified. The scheme operation efficiency and the overall safety can be improved. The scheme is enabled to resist quantum attacks.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an attribute encryption method based on a multi-linear mapping-based revocable sub-authoritative key strategy. Background technique [0002] Revocation has been intensively studied as an indispensable function in the field of public key cryptography. With the introduction and development of attribute encryption, research on attribute encryption schemes for revocable attributes can better meet actual needs, but most current revocable attribute schemes have obvious defects, that is, the calculation efficiency of the schemes is not high, and some schemes do not have tracking algorithms. Without judging the correlation between the user and the private key, the security is reduced to solving the deterministic bilinear Diffie-Hellman problem, which cannot resist quantum attacks. [0003] For the attribute revocation mechanism under multi-user, most of the exis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/08
Inventor 王尚平余小娟孙瑾
Owner 深圳天通信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products