Ciphertext access control method based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption)

A CP-ABE, access control technology, applied in ciphertext access control (that is, encrypting and controlling the user's decryption ability, the ciphertext access control field based on CP-ABE, can solve problems such as the inability to meet the security requirements of information sharing, etc.

Active Publication Date: 2016-10-05
INST OF APPLIED MATHEMATICS HEBEI ACADEMY OF SCI
View PDF2 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Faced with this situation, the traditional encryption system is power

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext access control method based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption)
  • Ciphertext access control method based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption)
  • Ciphertext access control method based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the purpose of the present invention, technical solutions and advantages clearer, the following combination Figure 1-Figure 6 and specific examples to clearly and completely describe the invention.

[0069] This embodiment classifies shared resources, those resources that cannot be shared with independent electronic documents, such as hardware devices, real-time information queries that do not form query result files, etc., the user's access rights are all recorded in their attribute certificates AC, access control adopts Technologies such as PMI mechanism, role-based access control model and XACML access control; and those resources that can be shared in the form of independent electronic documents use CP-ABE mechanism to achieve a sharing effect similar to broadcasting. Therefore, in our XACML access control model, its data flow model is as figure 1 As shown, add CP-ABE policies. These policies only include the operating environment conditions and p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a ciphertext access control method based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption), which belongs to the field of information security. The method comprises the following steps: preparation and maintenance work which comprises initialization of CP-ABE (Ciphertext-Policy Attribute-Based Encryption), user registration and auditing, generation of an asymmetric key pair for signature and encryption by the system and the user, generation of a CP-ABE attribute key SK for the user and key and attribute certificate management is carried out; 2, and file sharing requires a file provider, an extensible access control markup language (XACML) access control system and a sharing user to work cooperatively. The attribute certificate in a PMI system is used as an expression document for a CP-ABE attribute set and the access structure, the XACML expresses the CP-ABE policy, and security of the attribute set and the access control structure description is ensured. A hierarchical structure with an inheritance relationship is introduced, features such as distribution, authorization and calculability are supported, the attribute authorization ability needs to comply with constraints, and the method is applicable to a distributed and open network application environment.

Description

technical field [0001] The present invention relates to ciphertext access control (that is, encrypting and controlling user's decryption ability) technology, in particular to a CP-ABE-based ciphertext access control method, which belongs to the field of information security. Background technique [0002] With the rapid development of information technology and network technology, distributed applications have been more and more widely used, but for sensitive data in applications, it is necessary to implement ciphertext access control (that is, encrypt and control the user's decryption ability) to realize information security sharing. Traditional encryption systems such as PKI (Public Key Infrastructure) and identity-based encryption system IBE encryption have been widely used in distributed applications. The traditional encryption system must first enumerate the users in the sharing group and obtain their public keys, and use their public keys to generate ciphertext for eac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0822H04L9/0825H04L9/0847H04L63/101
Inventor 周彦萍黎彤亮赵环宇马艳东慕晓蕾万仲飞辛凤艳
Owner INST OF APPLIED MATHEMATICS HEBEI ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products