User access cancelling control method based on agent re-encryption

A proxy re-encryption and access control technology, applied in the field of user revocation access control based on proxy re-encryption, can solve the problems of reducing data upload efficiency and increasing the burden on data owners

Active Publication Date: 2016-08-17
JIANGSU DIGITAL DNA TECH CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the data owner is responsible for all ciphertext updates, which will increase the burden on the data owner and reduce the efficiency of data upload

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User access cancelling control method based on agent re-encryption
  • User access cancelling control method based on agent re-encryption
  • User access cancelling control method based on agent re-encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0032] The invention proposes a user revocation access control method based on proxy re-encryption. The method adopts proxy re-encryption technology to realize access control to revoked users and non-revoked users.

[0033] Firstly, the proxy re-encryption technology will be described below.

[0034] Proxy re-encryption technology is a key conversion mechanism, and its technical implementation process is as follows: firstly, the conversion key ω is generated; secondly, the proxy server uses ω to convert the encryption operation p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user access cancelling control method based on agent re-encryption. The user access cancelling control method comprises the following steps: when a user needs to be canceled from a system, generating relevant parameters of key updating by an attribute management mechanism related with user attributes; updating an accessing private key of a non-cancelled user in the system, so as to receive a data access request of the non-cancelled user by the system; sending a secret key for updating an information ciphertext to a cloud service region by the attribute management mechanism and carrying out ciphertext updating on a ciphertext without attributes by a cloud server; and deleting the user and the relevant data from an accessible user list in the system so as to cancel an access authority of the user to the system. According to the user access cancelling control method, only the ciphertext related to the attributes to the cancelled user is updated, without the need of updating all the ciphertexts, so that the communication expenditure of the whole system is reduced, the operation efficiency of the whole system is improved and the safety of the system is also guaranteed.

Description

technical field [0001] The invention relates to the technical field of traffic control, in particular to a user revocation access control method based on proxy re-encryption. Background technique [0002] Access control technology is a very effective security mechanism to protect data security. After the user is authenticated, it is necessary to authorize access or deny access according to the user's identity. In the access control scheme, the access problem caused by the change of the user, especially the withdrawal of the legitimate user is a crucial issue. The high-performance access control scheme is not only reflected in the access control of the current legitimate users, but also in the good access control can still be achieved when the user changes. For example, when a legitimate user revokes, the user can no longer access the data content, and other legitimate users can still access the data content in their own access rights. [0003] The technology currently used...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0891H04L63/10H04L67/60
Inventor 刘化胜杨接庞立君
Owner JIANGSU DIGITAL DNA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products