Revocable attribute base encryption method

An attribute-based encryption and attribute-based technology, which is applied to key distribution to ensure confidentiality, improve program efficiency, and achieve forward-backward security

Inactive Publication Date: 2018-01-09
SHANGHAI MARITIME UNIVERSITY
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current fine-grained access control of data that implem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Revocable attribute base encryption method
  • Revocable attribute base encryption method
  • Revocable attribute base encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] based on the following figure 1 , specifically explain the preferred embodiment of the present invention.

[0081] Such as figure 1 As shown, the present invention provides a reversible attribute-based encryption method, which comprises the following steps:

[0082] Step 1. System initialization: the trusted certification authority executes the Setup(k) algorithm, publishes the public key pk and saves the master key mk;

[0083] The trusted certification authority refers to an authority that can be fully trusted by users and is mainly responsible for generating master public keys and master keys for the system, and generating, distributing, revoking and updating attribute private keys for users;

[0084] Step 2. The trusted certification authority generates the user's private key: the trusted certification authority verifies the attributes of the user applying for registration, and generates a corresponding private key for each user through the KeyGen algorithm, and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a revocable attribute base encryption method. A master public key and a master key are generated for a system through a trusted authentication mechanism, and an attribute usergroup corresponding to each attribute is transmitted to a data management server after user attributes needing to be registered are verified and corresponding private keys are generated. The data management server generates a corresponding KEK two binary tree for each user, distributes an attribute group key, re-encrypts a cipher text encrypted by a data owner, and sends data use requests of the users the users after receiving the data use requests. When the trusted authentication mechanism receives a request of updating a user attribute group, the user attribute group can be updated in time,the data management server is informed of an updated user list, and the data management server performs key update of the user attribute group. If and only if a user is not revoked from an attribute group and is granted permission, the user can perform decryption. Through adoption of the revocable attribute base encryption method, flexible expression of an access strategy is implemented, and the forward and backward security of encrypted data is ensured. The method has high expansibility and practicability.

Description

technical field [0001] The invention relates to network file encryption, in particular to a revocable attribute-based encryption method. Background technique [0002] In recent years, facing a large number of users, key abuse has always been a problem that threatens user privacy and encrypted data security. An attribute set encryption scheme that supports fine-grained attribute revocation has more advantages than previous encryption schemes: on the one hand, the data owner only needs to encrypt the message according to the attribute, and only users who meet the ciphertext attribute requirements can decrypt the message, reducing the Data encryption overhead protects user privacy; on the other hand, flexible fine-grained access control policies for attributes are implemented through attribute AND, OR, NOT and threshold operations, and the confidentiality of encrypted data is also ensured. [0003] The comprehensive advantage of this method is that on the existing attribute-ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08
Inventor 蒋雁梅韩德志毕坤王军田秋亭
Owner SHANGHAI MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products