Multi-mechanism encryption method used in lattices for supporting strategy hiding

An encryption method and multi-institutional technology, applied in the cloud environment and cryptography, can solve the problems of not meeting application requirements and low security

Inactive Publication Date: 2018-09-07
SHANGHAI MARITIME UNIVERSITY
View PDF3 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, most of the lattice-based encryption methods are managed by a single trusted organization, which is not very secure and does not meet the actual application needs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-mechanism encryption method used in lattices for supporting strategy hiding
  • Multi-mechanism encryption method used in lattices for supporting strategy hiding
  • Multi-mechanism encryption method used in lattices for supporting strategy hiding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be further elaborated below by describing a preferred specific embodiment in detail in conjunction with the accompanying drawings.

[0042] like figure 1 As shown, the present invention discloses a multi-mechanism encryption method that supports policy hiding on a grid, which includes the following steps: S1, when the system is initialized, generate public parameters and system master private keys; S2, users apply for encryption for their own attribute sets key, the attribute organization generates a private key according to the public parameters, the system master private key and the user's attribute set; S3, transform the access structure into a corresponding access tree to realize the complete hiding of the access policy; S4, the data owner according to the Parameters, plaintext and converted access tree, generate ciphertext data, and then upload it to the cloud server for storage; S5, the user sends an access request to the cloud server, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-mechanism encryption method used in lattices for supporting strategy hiding. The multi-mechanism encryption method comprises steps that S1, during system initialization, a public parameter and a system main private key are generated; S2, a user applies for a cipher key for own attribute, and an attribute mechanism is used to generate a private key according to the public parameter, the system main private key, and the attribute set of the user; S3, an access structure is converted into a corresponding access tree to realize complete hiding of an access strategy;S4, a data owner is used to generate the ciphertext data according to the public parameter, a plain text, and the converted access tree, and the ciphertext data is uploaded to a cloud server for storage; S5, the user transmits an access request to the cloud server to acquire the ciphertext data stored in the cloud server; S6, the user uses the private key acquired from the attribute mechanism todecrypt the ciphertext data acquired from the cloud server, and the plaintext of the data owner is acquired, and related subsequent operations are carried out. The multi-mechanism encryption method isadvantageous in that the efficiency of the system is improved, and quantum attacks are prevented, and user privacy is effectively improved.

Description

technical field [0001] The invention relates to the technical fields of cloud environment and cryptography, in particular to a multi-mechanism encryption method supporting policy hiding on a grid. Background technique [0002] With the development of information technology, there are more and more private and enterprise data, presenting the form of big data, which promotes the development of cloud computing, and people are more and more inclined to store data in the cloud, which is convenient and saves costs and resources, especially For some small and medium enterprises. However, while bringing convenience, there are also some problems, especially the cloud storage security incidents that have occurred continuously in recent years. People store data in the cloud. These data will inevitably contain users’ private information, and users will lose access to sensitive data. Cloud servers may access the data they are interested in out of curiosity or commercial interests, and i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0819H04L9/0861H04L9/0894H04L63/0428H04L63/06H04L63/10H04L63/1441
Inventor 田秋亭韩德志王军毕坤
Owner SHANGHAI MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products