Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User revocation access control method based on proxy re-encryption

A proxy re-encryption and access control technology, which is applied in the field of user revocation access control based on proxy re-encryption, can solve the problems of increasing the burden on data owners and reducing the efficiency of data uploading, so as to reduce system update overhead, communication overhead, and guarantee safety effect

Active Publication Date: 2019-08-06
JIANGSU DIGITAL DNA TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the data owner is responsible for all ciphertext updates, which will increase the burden on the data owner and reduce the efficiency of data upload

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User revocation access control method based on proxy re-encryption
  • User revocation access control method based on proxy re-encryption
  • User revocation access control method based on proxy re-encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0032] The invention proposes a user revocation access control method based on proxy re-encryption. The method adopts proxy re-encryption technology to realize access control to revoked users and non-revoked users.

[0033] Firstly, the proxy re-encryption technology will be described below.

[0034] Proxy re-encryption technology is a key conversion mechanism, and its technical implementation process is as follows: firstly, the conversion key ω is generated; secondly, the proxy server uses ω to convert the encryption operation p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a user revocation access control method based on proxy re-encryption, including: when the user is about to withdraw from the system, the attribute management organization associated with the user attribute generates relevant parameters for key update; The access private key of the user has not been revoked, so that the system receives the data access request of the user who has not been revoked; the attribute management agency sends the key for information ciphertext update to the cloud service area, and the cloud server The ciphertext whose attributes have been revoked is updated; the user and its related data are deleted from the accessible user list in the system, so as to revoke the user's access right to the system. The present invention only updates the ciphertext related to the revoked user attributes, instead of updating all ciphertexts, thereby reducing the communication overhead of the entire system, improving the operating efficiency of the entire system, and ensuring the security of the system .

Description

technical field [0001] The invention relates to the technical field of traffic control, in particular to a user revocation access control method based on proxy re-encryption. Background technique [0002] Access control technology is a very effective security mechanism to protect data security. After the user is authenticated, it is necessary to authorize access or deny access according to the user's identity. In the access control scheme, the access problem caused by the change of the user, especially the withdrawal of the legitimate user is a crucial issue. The high-performance access control scheme is not only reflected in the access control of the current legitimate users, but also in the good access control can still be achieved when the user changes. For example, when a legitimate user revokes, the user can no longer access the data content, and other legitimate users can still access the data content in their own access rights. [0003] The technology currently used...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0891H04L63/10H04L67/60
Inventor 刘化胜杨接庞立君
Owner JIANGSU DIGITAL DNA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products