Multi-mechanism attribute-based encryption method supporting strategy dynamic updating

An attribute-based encryption and dynamic update technology, which is applied in the cloud environment and cryptography, can solve the problems of not meeting the actual application requirements, low security, low efficiency, etc.

Inactive Publication Date: 2017-05-17
HENAN POLYTECHNIC UNIV
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The policy update technology of ciphertext in the attribute-based encryption scheme is not mature, and the single-institution ABE scheme involving policy update only manages all attributes by

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-mechanism attribute-based encryption method supporting strategy dynamic updating
  • Multi-mechanism attribute-based encryption method supporting strategy dynamic updating

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The present invention will be further described below in conjunction with embodiment and accompanying drawing.

[0066] Assuming that the present invention has a total of N attribute institutions AA 1 ,AA 2 ,...,AA N , each attribute body AA i control set of properties And each user has a unique identity GID;

[0067] The algorithm flow designed by the present invention is specifically as follows:

[0068] Step 1: System initialization, executed by the system, input security parameters 1 λ , output the system public parameter PP. The specific steps of system initialization are:

[0069] Step 1.1: Input security parameter λ, output PP=(e,p,g,h,h 1 ,G,G T ), where G,G T is the multiplicative cyclic group of two order prime numbers p, g, h, h 1 is the generator of the group G, e:G×G→G T ;

[0070] Step 1.2: Choose a hash function: H:{0,1} * → Z p , calculate u=H(GID).

[0071] Step 2: The attribute organization is initialized, executed by the attribute org...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-mechanism attribute-based encryption method supporting strategy dynamic updating. The method comprises the seven steps of system initialization, attribute mechanism initialization, secret key generation, data encryption, decryption, dynamic updating secrete key generation and dynamic ciphertext updating. An anonymous secret key distributing protocol is introduced to generate a private key for a user, privacy of the user is effectively protected, and collusion attack of an attribute mechanism is resisted. In addition, a dynamic strategy updating algorithm is adopted, strategy updating of any type is supported, and calculation and communication overhead in traditional strategy updating is greatly reduced. The method is low in communication overhead, supports privacy protection and strategy updating and can be applied to a cloud storage environment.

Description

technical field [0001] The present invention relates to the field of cloud environment and cryptography, in particular to a multi-organization attribute-based encryption method that supports dynamic update of policies. The method supports dynamic update of data access policies and user privacy protection in cloud environments, and can be used in data outsourcing systems. Data security management, such as personal health record system. Background technique [0002] With the development of the Internet and the application of cloud computing, more and more people tend to store data in the cloud. However, these data often contain some sensitive information. In order to protect user privacy, sensitive private information needs to be encrypted. . Attribute based encryption (ABE, attribute based encryption), as a new public key encryption technology, binds the user's identity with a series of attributes. By setting the attribute set or access structure for the user's private key o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/06H04L63/062H04L67/10
Inventor 闫玺玺刘媛叶青汤永利李莹莹
Owner HENAN POLYTECHNIC UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products