Outsourcing encryption and decryption CP-ABE method capable of achieving user revocation

A CP-ABE, encryption and decryption technology, applied in the field of attribute-based outsourcing encryption and decryption mechanism, can solve the problem of expensive key update overhead

Inactive Publication Date: 2017-11-17
JINAN UNIVERSITY
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But in this scheme, once a user revocation occurs, all legitimate use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Outsourcing encryption and decryption CP-ABE method capable of achieving user revocation
  • Outsourcing encryption and decryption CP-ABE method capable of achieving user revocation
  • Outsourcing encryption and decryption CP-ABE method capable of achieving user revocation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0060] With the rapid development of network and cloud technology, mobile cloud computing has become an emerging service model, which in turn changes people's life, study, and medical care. Mobile cloud computing is to deploy multiple portable mobile devices on a cloud computing platform to share data. How to ensure the security of mobile device information; how to reduce the encryption and decryption costs of mobile devices; how to implement access control and revocation functions for users; if these problems are not resolved, the security of mobile cloud computing cannot be guaranteed. Therefore, according to the characteristics of mobile cloud computing, it is very necessary and urgent to study the corresponding security issues on this basis and establish an effective and safe encryption and decryption mechanism, which has important theoretical significance and application value.

[0061] Aiming at the above problems, this embodiment mainly studies the data encryption and d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an outsourcing encryption and decryption CP-ABE method capable of achieving user revocation, and relates to the technical field of data encryption and decryption in a mobile cloud environment. The method further achieves the outsourcing encryption operation on the basis of conventional outsourcing attribute encryption, and reduces the encryption calculation cost of a local client. The method achieves the access control of fine granularity of a file on a cloud server, simplifies the secret key management operation for a user, and achieves the revocation of the access authority of an unauthorized user. When the user is revoked, a legal user does not need to update a secret key, and alleviates the burden of an authorization mechanism. The local user just needs to carry out the simple XOR operation to update a cryptograph. The security proof indicates that the method provided by the invention has the non-adaptive selection plaintext safety under a common dual linear group model. The performance analysis indicates that the method reduces the encryption calculation cost of mobile equipment more effectively, can achieve the revocation of an illegal user efficiently, and achieves the control of the access authority of the user effectively.

Description

technical field [0001] The invention relates to the related technical field of an attribute-based outsourced encryption and decryption mechanism, in particular to a CP-ABE method for revocable user outsourced encryption and decryption in a mobile cloud environment. Background technique [0002] With the continuous development of mobile cloud computing technology, an emerging data sharing model has attracted great attention. The characteristic of mobile cloud computing is that its terminal equipment is portable and portable, and its storage space and computing energy are limited. Therefore, the local data is sent to the cloud server through the network carrier to realize data storage and sharing. The online storage space provided by the cloud service provider has the advantages of low cost, easy use and high scalability, and meets the demand for massive data storage. , and provide data sharing services, has become a key area of ​​information storage development. [0003] Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L63/0442H04L9/0825H04L9/0869H04L67/10
Inventor 王晓明方雪锋甘庆晴吴岱霓周思敏
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products