Unlock instant, AI-driven research and patent intelligence for your innovation.

An Encryption Method Realizing the Key Isolation Property of Ciphertext Policy

A technology of isolating attributes and ciphertext strategy, applied in key distribution, it can solve the problem that key loss cannot be minimized, and achieve the effect of reducing loss and damage

Active Publication Date: 2021-01-26
SHANGHAI MARITIME UNIVERSITY
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The attribute-based encryption scheme makes the access strategy more flexible. Relevant researchers took the advantages of ABE and proposed several ABE-based keyword search schemes, but their performance can still be further optimized.
For example, although the existing scheme can provide a revocation mechanism, it cannot minimize the loss when the key is leaked, and there is additional transmission overhead during the key update process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Encryption Method Realizing the Key Isolation Property of Ciphertext Policy
  • An Encryption Method Realizing the Key Isolation Property of Ciphertext Policy
  • An Encryption Method Realizing the Key Isolation Property of Ciphertext Policy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further elaborated below by describing a preferred specific embodiment in detail in conjunction with the accompanying drawings.

[0041] Such as figure 1 As shown, the present invention realizes the encryption method of the key isolation property of the ciphertext policy based on keyword search and bilinear pairing operation, including the following process:

[0042] Step S1, the cloud server initializes the parameters, the data owner inputs the security parameters, and the cloud server generates the system public key Pk and the system master key Mk;

[0043] Step S2, the data owner encrypts the keyword, and the data owner inputs the public key Pk and the keyword w to generate the ciphertext keyword cw;

[0044] Step S3, the data user inputs the system master key Mk and user attribute set N to the cloud server, and the cloud server generates the initial private key Sk of the data user;

[0045] Step S4, the data user enters the system mas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method for realizing the key isolation attribute of a ciphertext policy, comprising: cloud server initialization parameters; a data owner encryption key; a cloud server generating a key; a cloud server updating a key; and a data user updating a private key ; Data users generate trapdoor information; cloud server matching algorithm. The present invention does not need a secure channel for key transmission between data owners and data users, and introduces bilinear pairing operations to ensure data security and greatly reduce the possibility of key leakage; at the same time, the system life is divided into For several time periods, the public parameters of the system remain unchanged throughout the life cycle, and the private key of the data user will be refreshed from time to time. When the key is leaked, the private key of the data user can be updated in time to reduce the number of keys. The advantage of the damage caused by the leakage.

Description

technical field [0001] The invention relates to the technical field of data encryption, in particular to an encryption method based on keyword search and bilinear pairing operation to realize the key isolation property of a ciphertext policy. Background technique [0002] With the rapid development of the Internet, people can now realize various services such as online shopping and online remote medical monitoring through the Internet. Along with these services, a large amount of data is generated, and these data contain a lot of private data, such as home address and mobile phone number. Wait. Therefore, the protection of these data is very important. Encryption is an important means of providing security protection for these data. Through encryption, these data are converted into ciphertext and stored in cloud servers. [0003] There are many encryption technologies nowadays, and attribute-based encryption (ABE) is a very important encryption method, which is also known...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0891H04L63/0442H04L63/06
Inventor 魏滴韩德志王军毕坤
Owner SHANGHAI MARITIME UNIVERSITY