Attribute encryption scheme for cipher text having equal comparability

A technology of attribute encryption and ciphertext, which is applied in the field of attribute encryption scheme and cryptography, which can solve the problems of inconvenient storage structure and achieve the effect of ensuring security and reducing public key management and verification overhead

Active Publication Date: 2016-11-23
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Attribute encryption is often used to solve data security in cloud services, but attribute-encrypted data is stored in the clo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute encryption scheme for cipher text having equal comparability
  • Attribute encryption scheme for cipher text having equal comparability
  • Attribute encryption scheme for cipher text having equal comparability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] see image 3 , the specific execution steps include setting the system security parameters, key space, message space, and public parameters by the private key generation center, and generating the public key in the attribute set. The specific description is as follows:

[0024] (1) System initialization

[0025] (1.1) Let the system security parameter be λ, p be a large prime number, G 1 Represents a cyclic additive group of order p, g∈G 1 means G 1 generator, G 2 Represents a cyclic multiplicative group of order p. e represents the bilinear map G 1 ×G 1 →G 2 . Define a safe Hash function H, H means from G 2 map to G 1 A secure hash function for U elements h representing user attributes 1 ,h 2 ,...,h u ∈G 1 . The user private key key space is K∈G 1 , the encrypted message space is G 1 . Denotes a finite field Z p = {0,1,...,p-1} The set obtained by removing zero elements.

[0026] (1.2) The private key generation center is randomly selected Calcul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attribute encryption scheme for cipher text having equal comparability that can achieve safe comparison of cipher texts. The scheme comprises the steps of initializing system safety parameters, establishing an attribute universal set U, generating a main secret key msk, and generating public parameters params. A secret key generation center generates a private key sk according to an attribute set S of a user and the main secret key msk, and sends the private key to the user. A data owner firstly defines an access control structure A and a related attribute set, and a mapping function of the access control structure on a control matrix according to the params, and then generates a keyword cipher text CT1 and a data cipher text CT2 and sends the cipher texts to a cipher text manager. The cipher text manager can store and extract the cipher text according to comparison with the keyword cipher text CT1. When the user wants to get the cipher text related to keywords, the keywords are sent to the cipher text manager in a cipher text manner, the cipher text manager acquires the cipher text of related data according to comparison of the cipher texts of the keywords, and sends the cipher text of related data to the user, and the user can decrypt the data cipher text according to the own private key to acquire the corresponding data.

Description

technical field [0001] The invention relates to cryptography and belongs to the field of cloud storage management, in particular to an attribute encryption scheme with comparable ciphertexts. Background technique [0002] The attribute-based encryption scheme was first proposed by Sahai and Waters in the article "Fuzzy identity-based encryption" in 2005. Attribute-based encryption was developed on the basis of identity-based encryption. Later, attribute-based encryption was divided into ciphertext-based Policy-based attribute encryption system and key-based attribute encryption system. The access strategy structure of the ciphertext-based attribute encryption system is controlled by the encryptor, and the ciphertext is related to the access strategy structure. If the private key of the data user satisfies the access strategy, the plaintext can be obtained. Completely different from the ciphertext-based policy, in the key-based attribute encryption system, the access policy ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/30H04L9/32
CPCH04L9/3026H04L9/32H04L63/0428H04L63/10
Inventor 廖永建杨小伟刘章云薛荷洪坤峰
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products