Unlock instant, AI-driven research and patent intelligence for your innovation.

Verifiable attribute-based encryption outsourcing scheme supporting attribute hiding

An attribute-based encryption and attribute technology, applied in the field of cloud computing security

Inactive Publication Date: 2016-12-07
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, although attribute-based encryption can ensure that data can only be accessed by users with certain attributes, since the encrypted ciphertext is public, that is to say, anyone can obtain the ciphertext by accessing the data storage center. Brings another problem: Sometimes the access policy in the ciphertext is also part of privacy, and the data owner does not want others to know who can access their data. For example: the medical record data of mental patients is limited to the psychiatric department of a specific hospital Doctors can only access it, but patients do not want the sensitive information "this data can only be accessed by psychiatrists" to be known by others, but the existing attribute-based encryption cannot solve this problem well. At the same time, attribute-based The decryption operation of the encryption scheme is completely undertaken by the data visitor, which brings corresponding computing pressure to the data visitor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable attribute-based encryption outsourcing scheme supporting attribute hiding
  • Verifiable attribute-based encryption outsourcing scheme supporting attribute hiding
  • Verifiable attribute-based encryption outsourcing scheme supporting attribute hiding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The invention consists of three steps: initialization, encryption, and decryption. The specific implementation process of the three steps is as follows.

[0023] Symbol introduction.

[0024] 1)H(·)-{0,1} * →G N : Hash function in cryptography, G N Is a cyclic multiplication group.

[0025] 2) H 1 (·)-G 1 →{0, 1} logN : Hash function in cryptography, G 1 Is a cyclic multiplication group.

[0026] 3) The hash function in cryptography, Is a cyclic group of order p.

[0027] 4) Key derivation function in cryptography.

[0028] First define a bilinear mapping, G N And G 1 Is the cyclic multiplicative group of order given composite number N=pqr, p, q, r are different prime numbers, G p And G r G N Subgroup of, let g p And g r Separate its living members, e: G N ×G N →G 1 .

[0029] 1. Initialization.

[0030] 1) Run Setup by DO (1 κ )→(PK, MK) function to generate the public key and master key of the system: first select two random numbers: And calculate And e(g p , G p ) α ; Sele...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verifiable attribute-based encryption outsourcing scheme supporting attribute hiding. The verifiable attribute-based encryption outsourcing scheme is characterized by having a proxy decryption server with strong computing power, wherein a data visitor can transfer a calculating amount of a decryption portion to the proxy server, the proxy server helps the decryption portion to complete a decryption operation, a composite order group is used for hiding the attribute, it ensures that any information related to attributes, secret keys and plaintexts is leaked, and thus the purpose of hiding the attributes is achieved, and a computation burden of the data visitor when the decryption operation is executed is relieved.

Description

Technical field [0001] The invention belongs to the field of cloud computing security, and mainly solves the attribute hiding and verifiable decryption outsourcing in the attribute-based encryption scheme. Background technique [0002] Generally speaking, data owners store data in data storage centers. This data storage center may be a local server or a third-party data storage server, but no matter what kind of server it is, there is a danger of being attacked. In addition, the data owner also wants to implement certain encryption methods For users with specific attributes to share data, attribute-based encryption is a good way. [0003] However, although attribute-based encryption can ensure that data can only be accessed by users with certain attributes, the encrypted cipher text is public, which means that anyone can access the data storage center to obtain the cipher text. Brings another problem: sometimes the access policy in the ciphertext is also part of privacy. The data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0825H04L9/083
Inventor 赵洋熊虎蔡浩庭范鹏程徐骏孙伟
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA