Unlock instant, AI-driven research and patent intelligence for your innovation.

A Attribute Encryption Method with Equal Comparable Ciphertexts

A technology of attribute encryption and ciphertext, applied in the field of cloud storage management, can solve problems such as inconvenient storage structure, achieve the effect of ensuring security, reducing public key management and verification overhead

Active Publication Date: 2019-07-05
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Attribute encryption is often used to solve data security in cloud services, but attribute-encrypted data is stored in the cloud in the form of cipher text, which brings great inconvenience to cloud service providers in managing data storage structures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Attribute Encryption Method with Equal Comparable Ciphertexts
  • A Attribute Encryption Method with Equal Comparable Ciphertexts
  • A Attribute Encryption Method with Equal Comparable Ciphertexts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] see image 3 , the specific execution steps include the private key generation center setting system security parameters, key space, message space, and public parameters, and generating the public key in the attribute set. The specific description is as follows:

[0024] (1) System initialization

[0025] (1.1) Let the system security parameter be λ, p be a large prime number, G 1 Represents a cyclic additive group of order p, g∈G 1 means G 1 generator, G 2 Represents a cyclic multiplicative group of order p. e represents the bilinear map G 1 ×G 1 →G 2 . Define a safe Hash function H, H means from G 2 map to G 1 A secure hash function for U elements h representing user attributes 1 ,h 2 … h u ∈G 1 . The user private key key space is K∈G 1 , the encrypted message space is M space ∈G 1 . Denotes a finite field Z p ={0,1,...,p-1 is the set obtained by removing zero elements.

[0026] (1.2) The private key generation center randomly selects a, Calcul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attribute encryption scheme in which ciphertexts can be compared equally, which can realize safe ciphertext comparison. The invention includes: initializing system security parameters, establishing attribute complete set U, generating master key msk, and generating public parameters params. The key generation center generates a private key sk according to the user attribute set S and the master key msk and sends it to the user. The data owner first defines the access control structure A and the related attribute set and its mapping function ρ on the control matrix according to the params, and then generates the keyword ciphertext CT 1 and data ciphertext CT 2 And send it to the ciphertext manager. The ciphertext manager can according to the keyword ciphertext CT 1 Compare to store and extract ciphertext. When the user wants to get the ciphertext related to the keywords, the ciphertext form of the keywords is sent to the ciphertext manager, and the ciphertext manager obtains the ciphertext of the relevant data and sends it to the user according to the ciphertext comparison of the keywords. You can decrypt the data ciphertext according to your own private key to obtain the corresponding data.

Description

technical field [0001] The invention relates to cryptography and belongs to the field of cloud storage management, in particular to an attribute encryption method with comparable ciphertexts. Background technique [0002] The attribute-based encryption scheme was first proposed by Sahai and Waters in the article "Fuzzy identity-based encryption" in 2005. Attribute-based encryption was developed on the basis of identity-based encryption. Later, attribute-based encryption was divided into ciphertext-based strategies. The attribute encryption system and the key-based attribute encryption system. The access strategy structure of the ciphertext-based attribute encryption system is controlled by the encryptor, and the ciphertext is related to the access strategy structure. If the private key of the data user satisfies the access strategy, the plaintext can be obtained. Completely different from the ciphertext-based policy, in the key-based attribute encryption system, the access ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/32
CPCH04L9/3026H04L9/32H04L63/0428H04L63/10
Inventor 廖永建杨小伟刘章云薛荷洪坤峰
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA