Mobile social network based agent proxy re-encryption cross-domain friend-making privacy protection method

A mobile social network, proxy re-encryption technology, applied to encryption devices with shift registers/memory, key distribution, and can solve problems such as violent guessing, threats to the privacy and security of friends' data, etc.

Active Publication Date: 2017-05-10
HUNAN UNIV OF SCI & ENG
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, in this type of model, the access control structure set by the user has the risk of being violently guessed by malicious attackers. Once successfully cracked,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile social network based agent proxy re-encryption cross-domain friend-making privacy protection method
  • Mobile social network based agent proxy re-encryption cross-domain friend-making privacy protection method
  • Mobile social network based agent proxy re-encryption cross-domain friend-making privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0058] The schematic diagram of the overall architecture of the method of the present invention is as follows figure 1 shown.

[0059] FS: Responsible for storing ciphertexts of users' sensitive information about making friends, including personal photos, hobbies, contact information, identity information, personal videos and other information.

[0060] TA: Responsible for system initialization and attribute key generation, key distribution, and fine-grained access control policies for this area.

[0061] DO: Responsible for creating, modifying, deleting, encrypting, and specifying access control policies for files. Only the access control policies of the information owner who meet the attributes of the user who makes the friend request can correctly decrypt the file, so as to conduct further communication and communication. This article assumes that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile social network based agent proxy re-encryption cross-domain friend-making privacy protection method. Based on research on cryptography, a cross-domain re-encryption privacy protection protocol is brought forward, and privacy protection and security of mobile social network friend-making matching are realized. By use of a proxy re-encryption technology, a real access control structure of a friend-making initiator is hidden. At the same time, multiple authority centers are introduced, i.e., one authority center for one domain, the multiple authority centers are in charge of calculating secret keys, and the problems of performance bottlenecks and secret key management by use of a conventional single authority center are solved. An attribute ciphertext is associated with an access policy tree, a ciphertext access structure guarantees that only users according with a specified access control structure can obtain correct decryption secret keys and decrypt a data ciphertext of an information owner in a friend-marking center accordingly, and thus the security of a friend-making process is guaranteed.

Description

technical field [0001] The invention belongs to the field of computer science and technology, and in particular relates to a privacy protection method for making friends across domains based on mobile social network agent re-encryption. Background technique [0002] With the rapid development of mobile social networks (MSN, Mobile Social Networks) and smart terminal devices, users can share their moods, photos, activities, hobbies, etc. in MSN at any time to continuously discover new friends, thereby further expanding their social network Scope (Smart Circle, MyLifeHere, etc.). Users can find friends with common hobbies or users with certain characteristics by matching each other's personal attribute files in the cloud. However, in this process, because the cloud service provider (Cloud Services Provider, CSP) is not completely trusted, the user data stored in the cloud has security risks. For example: CSP may provide the user's data to a third party without the user's aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04L9/06
CPCH04L9/0643H04L9/0869H04L63/0435H04L63/062H04L63/105
Inventor 罗恩韬唐雅媛黄丽韶林华
Owner HUNAN UNIV OF SCI & ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products