Outsourcing attribute encryption method supporting attribute cancellation

An attribute encryption and attribute technology, which is applied to the public key and key distribution of secure communication, to achieve the effects of reducing computing overhead, efficient revocation, and good encryption

Inactive Publication Date: 2017-02-22
GUANGDONG UNIV OF TECH
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to alleviate the computational overhead of attribute authority and users, researchers have proposed an outsourcing scheme, that is, some or all operations of key generation and ciphertext decryption are completed by an outsourcing organization, but this puts forward higher requirements for system security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Outsourcing attribute encryption method supporting attribute cancellation
  • Outsourcing attribute encryption method supporting attribute cancellation
  • Outsourcing attribute encryption method supporting attribute cancellation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in detail below in combination with specific embodiments.

[0044]An outsourced attribute encryption method that supports attribute revocation in the present invention is specifically implemented according to the following steps:

[0045] Step 1, system initialization:

[0046] Specifically follow the steps below:

[0047] Input a security parameter λ and a description of the full set of attributes U={0,1} * , {0,1} * Represents a set {0,1,00,01,10,11,000,001,...} containing a combination of 0 and 1, and maps the full set of attributes to {0,1} * , and generate the corresponding parameter θ∈Z for the complete set of attributes p , where Z p ={0,1,....p-1}, the θ values ​​of different attribute sets are different, choose a group G whose order is a prime number p, its generator is g and it satisfies the bilinear mapping e:G×G→ G T , choose a hash function F that maps an element in U to an element in G. Choose random numbers ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an outsourcing attribute encryption method supporting attribute cancellation. A part of secret key generation and ciphertext decryption operation is given to an outsourcing mechanism for completion, and a version number is set for a private key of a user to support the attribute cancellation. Secret key generation is completed by an attribute authority and an outsourcing secret key generation mechanism together, and decryption operation is completed by a cloud storage provider and the user together. When a secret key is generated, the attribute authority sends correlation data to the outsourcing secret key generation mechanism, the outsourcing secret key generation mechanism returns a part of the generated secret key to the attribute authority, and the attribute authority calculates a correlation result so as to obtain a conversion secret key. When some attributes of a certain user are cancelled, the version number of the private key of the user is updated, an upgraded secret key is generated and sent to the user to enable the user to update his private key, at the same time, the conversion secret key corresponding to the user on the cloud storage provider is updated, and thus the purpose of attribute cancellation of the user is realized.

Description

technical field [0001] The invention belongs to the field of access control in cloud computing, and mainly relates to an outsourced attribute encryption scheme supporting attribute revocation. Background technique [0002] Attribute-based encryption (ABE) is an important branch of public-key encryption, which is an improvement and extension of identity-based encryption. The attribute-based encryption scheme generalizes the concept of unique identifiers representing user identities in identity encryption schemes. A collection of attributes representing a user's identity. The combination of attribute set and access structure realizes the access control of ciphertext and key. Ciphertext-based attribute encryption (CP-ABE) is an access control scheme widely used in cloud computing environments. It expresses user identity information as a set of attributes, and the ciphertext is associated with access control policies. Only when the user's private key is associated with Only wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0861H04L9/3006
Inventor 刘竹松彭佳鹏
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products