Secure revocable multi-center large attribute domain attribute-based encryption method in fog computing

An attribute-based encryption and fog computing technology, applied in computer security devices, computing, instruments, etc., can solve problems such as reducing fog efficiency and increasing equipment energy consumption, achieving security against selected ciphertext attacks, flexible and fine-grained access control , to achieve the effect of efficient cancellation

Active Publication Date: 2018-11-06
金华航大北斗应用技术有限公司
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing LU-MA-ABE scheme, the administration must update the keys of all nodes that have not been revoked one by one, or perform complex calculations on the nodes that have not been revoked, which will greatly reduce the efficiency of the fog or increase the efficiency of the equipment used. energy consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure revocable multi-center large attribute domain attribute-based encryption method in fog computing
  • Secure revocable multi-center large attribute domain attribute-based encryption method in fog computing
  • Secure revocable multi-center large attribute domain attribute-based encryption method in fog computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] The present invention provides a secure revocable multi-center large-attribute domain attribute-based encryption method in fog computing. For the revocable multi-center large-attribute domain CP-ABE, it defines the impossibility of permission selection, access strategy and static adaptive selected ciphertext attack. Differentiation (IND-sAA-sCCA2). Use Π={GSetup, ASetup, KeyUp, KeyUp, RKGen, Enc, ReEnc, Dec} to represent this system.

[0030] In this security model, the attacker can query the secret key associated with any access policy and the decryption of any ciphertext it chooses, but it cannot query the decryption of the challenge code if it queries the secret key associated with its specific access policy. key, it can only do this in Phase 1, and must immediately revoke one of its selected properties.

[0031] Such as figure 1 As shown, the attribute-based encryption method includes:

[0032] 11. Construct the global parameter Param;

[0033] 12. Take the glob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secure revocable multi-center large attribute domain attribute-based encryption method in fog computing, belonging to the field of encryption. The method includes the following steps: constructing a global parameter Param; taking the global parameter Param and an authority theta index as the input to obtain a public key PKtheta and a private key SKtheta; generating a private key SKGID, att for a user GID with an attribute expressed by a FORMULA (as shown in the original specification); taking a revocation list (RL) as the input at the authority theta to obtain {KUtheta, N}, and generating a re-encrypted key RKtheta for all unrevoked users with the attribute T(att)=theta in fog; taking a message M, an access policy (A, delta) and the key PKtheta of the authority asthe input to obtain a ciphertext C, and verifying the validity of the ciphertext C; and calculating the ciphertext C in fog to obtain a re-encrypted ciphertext C', and storing the obtained re-encrypted ciphertext in fog. The flexible fine-grained access control in fog computing can be implemented, and large attribute domains can be supported to meet various requirements in practical applications of fog computing, so that the scheme of the invention is applicable to the efficient revocation for the keys of resource-constrained devices in fog computing, and has the security of resisting chosen-ciphertext attacks.

Description

technical field [0001] The invention belongs to the field of encryption, in particular to an attribute-based encryption method for secure and revocable multi-center large attribute domains in fog computing. Background technique [0002] Cloud computing, in which end users upload requests and download results from cloud centers, seems to offer an ideal solution for processing large amounts of data. However, this mode is not applicable in some cases, such as delay-sensitive applications in wireless access sensor networks and mobile nodes. To fill this gap, fog computing extends cloud computing to the edge of the network for low latency and localization of data streams and real-time applications. Resource-constrained end-user devices such as wireless sensors are applied to the fog to enable real-time intelligent computing for connected vehicles, smart grids, wireless sensor and actuator networks, etc. Fog computing has broad application prospects, but there are information se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L29/06
CPCH04L63/0442G06F21/602G06F21/606
Inventor 不公告发明人
Owner 金华航大北斗应用技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products