Key aggregation encryption method capable of being revoked in cloud environment

An encryption method and cloud environment technology, applied in the field of key aggregation encryption, can solve the problems of not providing security certificates, expensive key update overhead, etc., achieve efficient user revocation efficiency, realize access control, and reduce the burden

Active Publication Date: 2017-05-31
广州广信网络科技有限公司 +1
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the system public parameter length of Chu et al.'s scheme is Ο(N), and no specific security proof is provided
In 2015, Sikhar et al. proposed a revocable key aggregation encryption scheme for the first time in the document "Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing", which realized the user's dynamic revocation function, but in this scheme, once When user revocation occurs, all legitimate users need to update their keys, which brings expensive key update overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key aggregation encryption method capable of being revoked in cloud environment
  • Key aggregation encryption method capable of being revoked in cloud environment
  • Key aggregation encryption method capable of being revoked in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0042] With the rapid development of network and storage technology, cloud storage has become a new service model, and data sharing is an important function of cloud storage. How to implement data sharing effectively, securely and flexibly; how to aggregate multiple decryption keys into a single key to minimize user key management costs and security risks; how to implement access control and revocation functions for users; If these problems are not solved, it is impossible to guarantee the security of cloud storage. Therefore, according to the characteristics of cloud storage, it is very necessary and urgent to study the corresponding security issues on this basis and establish an effective and secure key aggregation mechanism, which has important theoretical significance and application value.

[0043] In view of the above problems, this embodiment mainly studies the key aggregation mechanism in the cloud environment, and proposes a revocable key aggregation encryption method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key aggregation encryption method capable of being revoked in a cloud environment. A user revocation supporting function is added on the basis of a key aggregation mechanism, and a user dynamic management function on the key aggregation mechanism is improved. According to the method, not only is user key management simplified, but also different decryption permissions are granted to different users. Ciphertext is updated through a cloud storage server to achieve user permission revocation; when one user is revoked, the legal users do not need to update a key, and therefore the burden of an authority is reduced; and the ciphertext can be verified and updated, and it is guaranteed that user revocation is effectively executed. Security proof shows that on the basis of a Weak DHDHE assumption, it proves that the proposed method achieves non-adaptive selection plaintext security under a standard model. Performance analysis shows that by means of the method, the length of the user key and the ciphertext is kept to be O(1), the length of systematic public parameters is kept to be O(log N), more efficient user revocation efficiency is achieved, and control over access permissions of the users is effectively achieved.

Description

technical field [0001] The present invention relates to the related technical field of key aggregation mechanism, in particular to a revocable key aggregation encryption method in a cloud environment. Background technique [0002] With the continuous development of cloud computing technology, a new data storage mode, namely cloud storage, has attracted great attention. Cloud storage is a data storage service technology derived and developed from cloud computing. It saves local data in the online storage space provided by cloud service providers through the network. It is low-cost, easy-to-use and highly scalable. Advantages, meet the needs of massive data storage, and provide data sharing services, has become a key area of ​​information storage development. [0003] However, while cloud storage brings great convenience to people, it also brings new security issues and challenges. Because in the cloud computing environment, the cloud server is not completely trustworthy, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 王晓明甘庆晴吴岱霓房金盼方雪锋
Owner 广州广信网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products