Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption-and-decryption system with granularity controlling by user and method thereof

A fine-grained encryption and decryption technology, applied in digital transmission systems, transmission systems, and key distribution, can solve problems that are not suitable for cloud data encryption and decryption

Active Publication Date: 2018-03-06
实创时新(北京)科技有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The common disadvantage of this scheme and the previous one is that the revoked user can still decrypt the ciphertext generated in the past time period
Therefore, these solutions are not suitable for cloud data encryption and decryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption-and-decryption system with granularity controlling by user and method thereof
  • Data encryption-and-decryption system with granularity controlling by user and method thereof
  • Data encryption-and-decryption system with granularity controlling by user and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below through specific embodiments and accompanying drawings.

[0039] see figure 1, individual and business users can use the data encryption and decryption system 10 to encrypt data and publish the ciphertext on an untrusted server like a public cloud. Users can also obtain and decrypt ciphertext from the server. The data encryption and decryption system 10 is composed of a data owner 15 , a data user 20 , a key generation center 25 , a control server 30 , a private cloud 40 and a public cloud 50 . The interrelationships between the various parts are described as follows:

[0040] Without loss of generality, we assume that the key generation center 25 and the control server 30 are located in a private cloud operated by the data owner 15 . Other assumptions about key generation centers and control servers are discussed elsewhere. Each data user 20 has an attribute set, eg S={ABC Institute, Research Manager}. For exam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data encryption-and-decryption system with granularity controlling by a user and a method thereof. Encrypted data are outsourced to a public computer server, such as a publiccloud server so that an authorized user can access the outsourced data. The system and the method according to the invention are advantageous in that firstly, the system and the method support granularity access controlling and an accessing strategy with expression capability; secondly, the system and the method support high-efficiency instant cancelling of capability of decrypting past, now and future cryptograph by a revoked user; thirdly, the system and the method support instant updating of user attribute and user decryption capability; and fourth, the system and the method can effectivelyprevent decryption of encrypted data in a public computer server by the revoked user even the revoked user has known a symmetric secret key for encrypting the data.

Description

technical field [0001] The present invention relates to data encryption and decryption, especially data encryption and decryption using symmetric encryption, public key encryption and attribute-based encryption in combination. Background technique [0002] In the cloud computing environment, more and more data is stored on the cloud platform, and the software and hardware of the cloud platform are often provided by multi-party service providers rather than data owners. In order to protect the privacy of the data, it is recommended that the data owner encrypt the data before uploading it to the public cloud or any server. There are many existing data encryption and decryption technologies that can be used to protect the privacy of data. Among these technologies, attribute-based encryption, especially ciphertext-policy attribute-based encryption (CP-ABE), is a scalable solution suitable for cloud encryption and decryption (B.Waters, Ciphertext-policy attribute-based encryptio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0891H04L9/0894H04L63/0435H04L63/0884H04L63/101
Inventor 邓慧杰李迎九王展王绍斌
Owner 实创时新(北京)科技有限公司