Multi-authority ciphertext-policy attribute-based encryption method

An attribute-based encryption and authorization mechanism technology, which is applied to the public key and key distribution of secure communication, can solve the problems of reducing the calculation cost in the decryption stage, increasing the calculation time, and affecting the battery life of mobile devices.

Active Publication Date: 2016-12-14
ANHUI UNIVERSITY
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the process of implementing the present invention, the inventor found that: the above-mentioned document encryption stage requires a complete encryption process, which does not reduce the calculation cost of the mobile terminal in the encryption phase, but only reduces the calculation cost of the decryption phase; When encrypting operations, the calculation time is greatly increased, which seriously affects the battery life of mobile devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-authority ciphertext-policy attribute-based encryption method
  • Multi-authority ciphertext-policy attribute-based encryption method
  • Multi-authority ciphertext-policy attribute-based encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0043] Figure 1 to Figure 3 Some embodiments according to the invention are shown.

[0044] Such as figure 1 and figure 2 As shown, the ciphertext policy attribute-based encryption method of multiple authorities includes the following steps:

[0045] Step S11, system initialization and establishment of multiple authorized institutions;

[0046] Step S13, when the mobile terminal device is started each time, perform pre-encryption processing to generate intermediate ciphertext;

[0047] Step S15. During the process of uploading the intermediate ciphertext to the cloud storage server, use the access policy defined by the linear secret sharing mechanism to encrypt the intermediate ciphertex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-authority ciphertext-policy attribute-based encryption method. The method includes following steps: step 1, performing system initialization and establishing a plurality of authorities; step 2, before each starting of a mobile terminal device, executing pre-encryption treatment, and generating an intermediate ciphertext; step 3, in a process of uploading the intermediate ciphertext to a cloud storage server, encrypting the intermediate ciphertext by employing an access policy defined by a linear secret sharing mechanism, and outsourcing the intermediate ciphertext to the cloud storage server; and step 4, generating a private key for an encryption file according to global identifiers of users and an attribute set of the users by each authority. According to the method, aiming at the mobile cloud storage environment, on the premise of guaranteeing the data security, a lot of pairing operations are pre-processed in advance by employing the encryption pre-processing technology so that the calculation cost of online encryption is minimum; and by employing the secret key transformation technology and decryption outsourcing, a lot of pairing operations are outsourced to the cloud storage server so that the decryption calculation cost of the mobile terminal is reduced.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a ciphertext policy attribute-based encryption method for multi-authorization organizations in a distributed cloud storage environment. Background technique [0002] With the popularization of mobile terminal devices, it is becoming more and more popular for users to use mobile devices to share and process data in a cloud storage environment. The ensuing data security, privacy leakage and other issues hinder the development of cloud computing. [0003] The existing ciphertext policy (Ciphertext-Policy Attribute-based Encryption, CP-ABE) attribute-based encryption (Attribute-based Encryption, ABE) combines encryption and data sharing ingeniously, and is considered to be very popular in the field of cloud computing. One of the promising encryption methods. In CP-ABE, the ciphertext is related to the access policy, and the key is related to the attribute set. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08H04L29/06H04L29/08
CPCH04L9/0825H04L9/3073H04L63/0485H04L67/1097
Inventor 仲红朱文龙许艳崔杰石润华陈志立张顺
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products