Private key fixed-length ciphertext-policy attribute-based encryption method

A technology of attribute-based encryption and ciphertext strategy, applied in the field of information security, can solve problems such as poor expression ability and expression efficiency

Active Publication Date: 2017-06-13
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Various structures such as threshold structure, LSSS matrix, AND gate and distribution matrix have been adopted to develop CP-ABE, but these structures are not ideal in terms of expressive ability and expressive efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private key fixed-length ciphertext-policy attribute-based encryption method
  • Private key fixed-length ciphertext-policy attribute-based encryption method
  • Private key fixed-length ciphertext-policy attribute-based encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0076] A ciphertext policy attribute-based encryption method with a fixed-length private key, and a schematic diagram of the overall framework of the CP-ABE scheme designed with ROBDD as the access structure. figure 1 As shown, there are four entities in total: the data encryption party, that is, the data owner; the data decryption party, that is, the data user; the authorization center; and the cloud storage server. The encryption method mainly includes the following four basic algorithms:

[0077] 1) Setup algorithm, executed by the authorization center, mainly performs the following operations: select a bilinear group G with order p 0 , with a generator g, the two-line row mapping is denoted as e:G 0 ×G 0 →G 1 ; Choose Z randomly p elements in y,t 0 ,t 1 ,...,t n-1 ,t 0 ',t 1 ',...,t n-1 '. make Further generate the system public key and master key

[0078] 2) Encrypt (PK, M, ROBDD) algorithm, executed by the data owner, mainly completes the data encryption...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a private key fixed-length ciphertext-policy attribute-based encryption method. The method comprises two parts of core content of an access structure based on a simplified ordering binary decision diagram and a ciphertext-policy attribute-based encryption method based on the access structure, and implementation of the two parts of the content mainly comprises four entities of a data encryption party, a data decryption party, an authorization center and a cloud storage server; the implementation process comprises the following four steps of 1 system establishment, 2 plaintext encryption (including construction of the access structure), 3 private key generation and 4 ciphertext decryption. The access structure included in the technical scheme can support access policies represented by any Boolean expressions, and the higher working capacity and the higher working efficiency are achieved; the encryption method in the technical scheme has the advantages of being high in access structure working performance, extremely small in user private key occupied space, fixed in length, capable of achieving rapid decryption and the like, and the overall performance is more flexible and efficient.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a ciphertext policy attribute-based encryption method with a fixed-length private key. Background technique [0002] As a relatively mature encryption method, public key encryption has been widely used, but the traditional public key encryption needs a pair of keys—public key and private key in the implementation process, where the public key is used by the encryption party to encrypt The plaintext information and the private key are used by the decryption party to decrypt the ciphertext information, and the two keys have a one-to-one correspondence. However, in network scenarios such as shared storage, cloud computing, and cloud manufacturing that have been widely studied and put into practice, the number of users and the amount of accessed data are relatively large, and data owners need to maintain a one-to-many relationship with data users , so when the tradition...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L29/06
CPCH04L9/3073H04L63/0442H04L63/062
Inventor 古天龙李龙常亮李晶晶刘华东宁黎华
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products