Attribute base encryption method and device

A technology of attribute-based encryption and user attributes, applied in the field of data security, can solve the problems of monotonic access control structure, no verification key correctness, etc., and achieve the effect of reducing computing cost

Active Publication Date: 2016-04-27
NANJING UNIV OF FINANCE & ECONOMICS
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the problem that the calculation cost of the encryption algorithm existing in the attribute-based encryption method in the prior art is proportional to the complexity of the access control structure adopted, the length of the ciphertext is proportional to the complexity of the access control structure adopted, and the decryption The algorithm is proportional to the complexity of the access co

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute base encryption method and device
  • Attribute base encryption method and device
  • Attribute base encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] The technical method of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0043] figure 1 It is a flow chart of the attribute-based encryption method provided by Embodiment 1 of the present invention. like figure 1 As shown, this embodiment includes the following steps:

[0044] S110, the central institution establishes an attribute-based encryption system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an attribute base encryption method and device. The attribute base encryption method comprises the following steps: establishing an attribute base encryption system by a central mechanism; receiving a key sent by the central mechanism, wherein the key is generated by the central mechanism through a public parameter of the attribute base encryption system, a main key of the attribute base encryption system and a first user attribute, and the public parameter of the attribute base encryption system and the main key of the attribute base encryption system are generated according to a security parameter of the central mechanism; receiving a ciphertext sent by a second user, wherein the ciphertext is generated by the second user through an access control structure and the public parameter; and when the first user attribute satisfies the access control structure, decrypting the ciphertext by a first user through the key. Therefore, encryption and decryption algorithms have fixed calculation costs, the ciphertext has a fixed length, the correctness of the key generated by the central mechanism can be verified, and the monotonic access control structure can be realized.

Description

technical field [0001] The invention relates to the field of data security, in particular to an attribute-based encryption method and device. Background technique [0002] As a new computing model, cloud computing is being used by more and more users. However, data security in cloud computing has become the most concerned issue for users. In the traditional public key encryption method, the encryptor can use the recipient's public key to encrypt the message, so that only the recipient with the corresponding key can decrypt the ciphertext. Therefore, traditional public key encryption methods can only provide one-to-one secure data transmission. However, in cloud computing, one user needs to share confidential data to multiple users at the same time. In particular, users often want to utilize a descriptive set of attributes to indicate which users have access to their confidential data. Therefore, traditional public key encryption methods cannot be directly applied to prot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/083H04L9/0866
Inventor 韩金广曹杰伍之昂史本云毛波黄健卜湛张璐
Owner NANJING UNIV OF FINANCE & ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products