Encryption method supporting non-monotone access structure, with constant cipertext length and capable of searching attribute set

An access structure, non-monotonic technology, applied in the field of computer security, to achieve the effect of reducing computing costs and communication costs

Inactive Publication Date: 2018-10-09
NANJING UNIV OF FINANCE & ECONOMICS
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in existing attribute-based searchable encryption schemes, the computational cost and communication cost are linearly related to the number of required attributes
In addition, existing attribute-based searchable encryption schemes mostly use monotonous access structures, and users who have the required attributes (active attributes) in the access structure can generate trapdoors for specified keywords

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method supporting non-monotone access structure, with constant cipertext length and capable of searching attribute set
  • Encryption method supporting non-monotone access structure, with constant cipertext length and capable of searching attribute set
  • Encryption method supporting non-monotone access structure, with constant cipertext length and capable of searching attribute set

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following is attached figure 1 , the present invention will be further described.

[0033] The system of the present invention comprises following 8 stages:

[0034] (1) System establishment stage: the central institution inputs safety parameters 1 l and the total attribute set The number of attributes in n, run the bilinear group generation algorithm BG(1 l ) → (e, p, G, G τ ) to get a bilinear group. Suppose g and h are generators of group G, H: {0, 1} * → Z p is a collision-resistant hash function. The central agency randomly selects random parameters and and calculate and where k=1, 2, . . . , 2n. The central authority sets the initial version number ver=1.

[0035] The public parameters of the system are The master key is

[0036] (2) Key generation phase: when the owned attribute set is S U When a user U joins the system, the central organization randomly selects random parameters and calculate a U =g α and

[0037]

[0038] in,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption method supporting a non-monotone access structure, with a constant cipertext length and capable of searching an attribute set. The method comprises the following advantages that (1) the method supports the non-monotone access structure which can express a more flexible access strategy compared with a monotonic access structre; (2) the calculation cost in the index encryption phase is fixed, and the length of a generated searchable ciphertext is constant; (3) a trapdoor generated in a trapdoor generation phase of the method is constant in length; (4) the calculation cost in the detection phase of the encryption method is constant; and (5) the encryption method support valid attribute cancelation. Thus, the method supports the more flexible access structure, and greatly reduces the calculation and communication cost of the encryption scheme capable of searching the attribute set. The encryption method is more suitable for a mobile facility whose storage space and computing capability are limited, such as a smart phone or IPad.

Description

technical field [0001] The invention belongs to the field of computer security, and in particular relates to an attribute-based searchable encryption method with fixed ciphertext length supporting non-monotonic access structure. Background technique [0002] In a cloud computing environment, in order to protect the confidentiality of data, users usually first encrypt the data to obtain ciphertext, and then store the ciphertext in the cloud server. Because users will generate a large amount of data in cloud computing, whether users can effectively search the ciphertext stored in the cloud server is a very important issue. [0003] The searchable public key encryption mechanism provides a solution to the above problems. In a searchable public key encryption scheme, users can check whether a ciphertext contains specified keywords through a central organization without revealing any information of the plaintext. However, the traditional searchable public key encryption mechani...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0825H04L9/0869
Inventor 韩金广杨烨曹杰伍之昂史本云黄健毛波卜湛
Owner NANJING UNIV OF FINANCE & ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products