Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attribute-based encryption method preventing key colony and key abuse

An attribute encryption and attribute technology, applied in the public key and key distribution of secure communication, which can solve the problems of message plaintext leakage, key cloning key abuse, etc.

Inactive Publication Date: 2017-10-10
SOUTHWEST JIAOTONG UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, none of the above attribute-based encryption schemes solves the security problems of key cloning and key abuse from the source. Instead, after the attacker performs illegal operations, appropriate remedial methods are adopted, and the plaintext of important messages may have been leaked.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0040] A specific embodiment of the present invention is an attribute-based encryption method against key cloning and key abuse, and its specific operation steps are:

[0041] A. System initialization

[0042] A1. The attribute set in the system is recorded as P, and the number of all attributes in the attribute set P is K×N. All attributes are numbered from 1, and the elements contained in the attribute set P are the elements corresponding to specific attributes. Numerical number; the system includes a central authority CAP and K attribute authority centers AA k and an identity authorization center IA; the system divides the attribute set P into K attribute subsets P 1 ,P 2 ,…P k ...,P K , each attribute subset P k Including N attributes, P k ={p k,1 ,p k,2 ,...p k,n ...,p k,N}, where p k,n is the kth attribute subset P k The nth element in , whose value is (k-1)N+n; the system will subset the kth attribute P k The N attributes of are assigned to the kth attribut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an attribute-based encryption method preventing key colony and key abuse. The main operations are as follows: A. system initialization; B. attribute key generation: an attribute authorization center generates a corresponding attribute key by using an attribute set and parameters of a user and sends the attribute set and an attribute security parameter of the user to an identity authorization center; C. identity key generation: the identity authorization center generates a corresponding identity key by the received attribute security parameter and its own parameter; D. encryption: a message sender performs encryption processing on the message through a system public parameter; and E. decryption: the user performs a decryption operation on a ciphertext by using his own attribute set, the attribute security parameter and the identity security parameter. By adoption of the method, when an intersection of an attribute set of the decryption user and the attribute set of a message ciphertext satisfies a specific constraint condition, and when the attribute set of the user corresponds to the attribute set of the generated key, the ciphertext can be decrypted, and the potential safety hazard caused by key colony and key abuse can be effectively prevented.

Description

technical field [0001] The invention relates to the field of attribute-based encryption in the field of information security technology. Background technique [0002] With the gradual popularization of cloud computing, more and more sensitive data are stored on third-party servers and shared and disseminated on the Internet. Therefore, storing these data in an encrypted form has become an inevitable trend. However, users lack basic control over encrypted data stored on cloud servers and trust in cloud service providers. The complexity, openness and dynamics of the cloud computing environment and the diversity of user needs under cloud computing all make the traditional public key cryptosystem difficult to apply, which greatly hinders the further development and application of cloud computing. It is urgent to make improvements on the basis of traditional public-key cryptography algorithms and design a better public-key cryptography system to ensure the integrity and confiden...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L9/08
Inventor 张文芳袁超王小敏
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products