Attribute-based ciphertext searching system and method in support of proxy re-encryption

A technology of proxy re-encryption and retrieval system, applied in the field of cloud computing, can solve the problem that the grant of search authority cannot be effectively realized.

Active Publication Date: 2018-08-17
NANJING UNIV OF POSTS & TELECOMM
View PDF6 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the problem that the search authority cannot be effectively granted in the attribute-based searchable encryption scheme in the cloud c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based ciphertext searching system and method in support of proxy re-encryption
  • Attribute-based ciphertext searching system and method in support of proxy re-encryption
  • Attribute-based ciphertext searching system and method in support of proxy re-encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0057] The invention discloses an attribute-based ciphertext retrieval system and method supporting proxy re-encryption in a cloud computing environment. The method simultaneously realizes two functions of user's safe retrieval and effective sharing of search authority in the cloud environment. The access structure based on LSSS linear secret sharing matrix adopted by this method not only supports fine-grained description of the attributes of access users, but also has high computational efficiency. In the threshold generation stage, random values ​​are used to blind the user key and then submitted to the cloud server, which ensures the confidentiality and security of the user key. On the other hand, considering the entrustment of search rights when the authorized user is not online in practical applications, the proxy re-encryption technology is i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attribute-based ciphertext searching system and method in support of proxy re-encryption. According to the method, two functions that a user securely carries out searching and effectively shares searching authority in a cloud environment are realized at the same time. According to the method, through adoption of an LSSS linear secret sharing scheme, an attribute of an access user can be described in fine granularity, and the relatively high computing efficiency is achieved. In a threshold generation phase, a blind technology is carried out on a user key through utilization of a random value, and then the user key is submitted to a cloud server, so the confidentiality and security of the user key are ensured. A searching authority entrusting problem when an authorization user is offline in practical application is taken into consideration. A proxy re-encryption technology is imported, and the cloud server converts a ciphertext, so the encryption/decryption pressure of a data owner is migrated, and the system efficiency is greatly improved.

Description

technical field [0001] The invention relates to an attribute-based ciphertext retrieval system and method supporting proxy re-encryption, and belongs to the technical field of cloud computing. Background technique [0002] Cloud computing is a new topic in the field of information technology, and it is the further development of parallel computing, distributed computing and grid computing. Cloud storage is an important service of cloud computing, which allows data owners to store their data on the cloud, and cloud servers provide round-the-clock data access to users. Ordinary users only need a terminal, a smart phone or a tablet connected to the Internet to access the data in the cloud server anytime and anywhere. For enterprise users, especially small and medium-sized enterprises with limited funds, cloud computing enables them to obtain flexible on-demand services without having to purchase expensive hardware platforms, thereby reducing costs. Although cloud services bri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/08
CPCH04L9/0861H04L9/0869H04L9/0877H04L67/10H04L67/56
Inventor 陈燕俐胡媛媛朱敏惠
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products