Attribute-based multi-mechanism hierarchical ciphertext-policy weight encryption method under cloud environment

A technology of ciphertext strategy and encryption method, which is applied in the field of network and information security, and can solve problems that do not involve the hierarchy of multi-authorization institutions

Active Publication Date: 2016-10-26
NANJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it does not address the issue of multi-authority hierarchy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based multi-mechanism hierarchical ciphertext-policy weight encryption method under cloud environment
  • Attribute-based multi-mechanism hierarchical ciphertext-policy weight encryption method under cloud environment
  • Attribute-based multi-mechanism hierarchical ciphertext-policy weight encryption method under cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The specific embodiment of the present invention will be further described in detail in conjunction with the accompanying drawings. The present invention proposes a weighted attribute-based encryption scheme of a hierarchical authorization center, which not only introduces attribute weights into the encryption scheme, but also adopts a multi-level authorization center mechanism, and utilizes the difference in the size of attribute weights that can be distributed by authorization agencies at different levels. Implemented finer-grained access control. This method is proved to be safe under the standard model, and the performance analysis shows that this scheme is more suitable for cloud environment than existing schemes.

[0022] Such as figure 1 As shown, it is divided into two different management areas, namely the public domain (Public Domain, PUD) and the personal domain (Personal Domain, PSD). Among them, (1) is to generate AID or UID, and distribute master key or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attribute-based multi-mechanism hierarchical ciphertext-policy weight encryption method under a cloud environment. The method comprises steps: a central authority mechanism generates a global identifier AID or UID for a subordinate attribute authority mechanism or a user, and calculates an attribute weight segmentation set for each attribute in a system; the central authority mechanism randomly selects a bilinear pairing and a bilinear group, generates a system main key MK and a public key PK, retains the MK and publishes the PK; the central authority mechanism distributes the main key or a weight attribute private key for the subordinate attribute authority mechanism or the user; a data owner selects an access policy, encrypts a file and uploads the file to a cloud server; the user requests the cloud server for accessing to the encrypted file, the cloud server returns back a ciphertext CT, the user decrypts the file through the weight attribute private key, and if the attribute in the private key satisfies the access policy, the user obtains a plaintext. With the method provided by the invention, a graded hierarchical multiple-authority mechanism is established, and the authorities of different grades can be in charge of different attributes and distribute private key components.

Description

technical field [0001] The invention belongs to the technical field of network and information security, and in particular relates to an attribute-based multi-organization hierarchical ciphertext policy weight encryption method in a cloud environment. Background technique [0002] With the development of cloud computing, more and more users or enterprises choose to store data in the cloud. However, the outsourced storage mode of data can easily lead to unauthorized access. For example, cloud servers can obtain user data without user authorization and leak user privacy. In addition, the cloud server may also be subject to external threats, such as being attacked by hackers. For data security issues, most cloud service users encrypt their data before uploading. The traditional public key encryption method can guarantee data security, but it must know potential users in advance and use their public keys to encrypt data files separately, which lacks flexibility and operability...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0825H04L9/083H04L63/105
Inventor 陈丹伟刘书雅
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products