An attribute-based ciphertext retrieval system and method supporting proxy re-encryption

A technology of proxy re-encryption and retrieval system, applied in the field of cloud computing, can solve the problem that the grant of search authority cannot be effectively realized.

Active Publication Date: 2020-10-23
NANJING UNIV OF POSTS & TELECOMM
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the problem that the search authority cannot be effectively granted in the attribute-based searchable encryption scheme in the cloud computing environment, the present invention provides an attribute-based ciphertext retrieval system and method that supports proxy re-encryption in cloud computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An attribute-based ciphertext retrieval system and method supporting proxy re-encryption
  • An attribute-based ciphertext retrieval system and method supporting proxy re-encryption
  • An attribute-based ciphertext retrieval system and method supporting proxy re-encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0057] The invention discloses an attribute-based ciphertext retrieval system and method supporting proxy re-encryption in a cloud computing environment. The method simultaneously realizes two functions of user's safe retrieval and effective sharing of search authority in the cloud environment. The access structure based on LSSS linear secret sharing matrix adopted by this method not only supports fine-grained description of the attributes of access users, but also has high computational efficiency. In the threshold generation stage, random values ​​are used to blind the user key and then submitted to the cloud server, which ensures the confidentiality and security of the user key. On the other hand, considering the entrustment of search rights when the authorized user is not online in practical applications, the proxy re-encryption technology is i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attribute-based ciphertext retrieval system and method supporting proxy re-encryption. The method simultaneously realizes two functions of user's secure retrieval and effective sharing of search authority in a cloud environment. The access structure based on LSSS linear secret sharing matrix adopted by this method not only supports fine-grained description of the attributes of access users, but also has high computational efficiency. In the threshold generation stage, random values ​​are used to blind the user key and then submitted to the cloud server, which ensures the confidentiality and security of the user key. On the other hand, considering the entrustment of search rights when the authorized user is not online in practical applications, the proxy re-encryption technology is introduced to convert the ciphertext by the cloud server, which reduces the encryption and decryption pressure of the data owner and greatly improves the system efficiency.

Description

technical field [0001] The invention relates to an attribute-based ciphertext retrieval system and method supporting proxy re-encryption, and belongs to the technical field of cloud computing. Background technique [0002] Cloud computing is a new topic in the field of information technology, and it is the further development of parallel computing, distributed computing and grid computing. Cloud storage is an important service of cloud computing, which allows data owners to store their data on the cloud, and cloud servers provide round-the-clock data access to users. Ordinary users only need a terminal, a smart phone or a tablet connected to the Internet to access the data in the cloud server anytime and anywhere. For enterprise users, especially small and medium-sized enterprises with limited funds, cloud computing enables them to obtain flexible on-demand services without having to purchase expensive hardware platforms, thereby reducing costs. Although cloud services bri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/08
CPCH04L9/0861H04L9/0869H04L9/0877H04L67/10H04L67/56
Inventor 陈燕俐胡媛媛朱敏惠
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products