Distributed cross-domain authorization and access control method based on attribute password

A technology of access control and attribute encryption, which is applied in the field of distributed cross-domain authorization and access control, and can solve problems such as not supporting secret key delegation, hierarchical management, and no attributes

Active Publication Date: 2018-08-17
CHONGQING UNIV OF POSTS & TELECOMM
View PDF8 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing attribute encryption research, the author WangG et al. proposed an effective key delegation mechanism in the hierarchical attribute encryption scheme in the paper "Hierarchical attribute-based encryption for fine grained access control in cloud storage services", which can realize key delegation between users ; An efficient key distribution method is proposed in CN105915333A, but only a single attribute authority is distributing the secret key. In the actual implementation process, the burden on the authority is greatly increased
In the Chinese patent document CN2015101068880.5, the patent titled "A D

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed cross-domain authorization and access control method based on attribute password
  • Distributed cross-domain authorization and access control method based on attribute password
  • Distributed cross-domain authorization and access control method based on attribute password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.

[0069] The distributed cross-domain authorization and access control method based on attribute password provided by the present invention, see figure 2 , including the following steps:

[0070] S1: System initialization generation: system public parameters, public / private key pairs of service providers (ServiceProviders, SPs), public / private key pairs of attributes, public / private key pairs of identity federation providers (FederatedIdentityProvider, FIP);

[0071] Further, see image 3 , the step S1 includes the following steps:

[0072] S11: FIP initialization of identity federation provider: input security parameters, generate system public parameters and public / private key pair of identity federation provider, including:

[0073] S111: Input the security parameter λ,

[0074] S112: Generate system public parameters PP, where the system p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a distributed cross-domain authorization and access control method based on an attribute password. The method is mainly used for solving the problems of cross-domain authorization and access control under a large-scale distributed environment. The invention designs a hierarchical attribute-based encryption with controlled key delegation and attribute authorities, supportingdecentralized and controlled security authorization for users of a plurality of domains, preventing abuse of the key delegation, and accordingly achieving non-interactive access control. The method also supports decoding of an external packet, and supports the authorization to the light-weight users for accessing the system.

Description

technical field [0001] The invention belongs to the field of data security storage and access in the discipline of computer information security, and particularly relates to a distributed cross-domain authorization and access control method in a distributed environment. Background technique [0002] With the rapid development of computer technology and the Internet, a large amount of data generated every day is stored on computers in digital form. Cloud computing is an emerging technology in which users rent storage and computing resources from a company-provided server (also known as the cloud). Users only need a terminal, smartphone or tablet connected to the Internet. Applications run in the cloud, not on the user's machine. The cloud can store large amounts of data, so mobile users don't have to carry their data with them. Some cloud providers provide application services (eg, Google Apps, Microsoft Online), some provide infrastructure support (eg: Amazon's EC2, Eucal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0825H04L9/0847H04L63/10H04L63/101
Inventor 陈壮肖敏刘雪娇
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products