Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed attribute-based encryption method supporting fine-grit attribute revocation on lattice

An attribute-based encryption and fine-grained technology, applied to key distribution, can solve the problems of inflexible use, difficulty in ensuring the confidentiality of stored data, and time-consuming

Active Publication Date: 2018-11-23
芽米科技(广州)有限公司
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The analysis shows that the existing attribute-based encryption methods still have the following deficiencies: First, most of the existing attribute-based encryption methods use bilinear pairing construction, and their security is based on the Diffie-Hellman difficulty that has been proven to be difficult to resist quantum cryptanalysis Therefore, it is difficult for these methods to guarantee the confidentiality of stored data in the "quantum era"; in addition, these methods require a lot of time-consuming bilinear pairing operations in the encryption and decryption process, which is inefficient
However, this method can only implement the threshold access strategy using the Shamir secret sharing method, which is not flexible enough
In addition, the system is responsible for the distribution and management of all attribute keys in the system by a single attribute authority, so there is an attribute key custody problem and the security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0059] A distributed attribute-based encryption method that supports fine-grained attribute revocation on a lattice, the steps of which are:

[0060] A. System initialization

[0061] A1. Generation of system public key and private key

[0062] The system center first randomly selects a prime number q with λ digits according to the set security parameter λ, and then randomly selects a dimension n with a digit smaller than λ and a Gaussian parameter α; 2 The random number m of q, as the number of columns m;

[0063] Then, the system center randomly generates an n-dimensional target vector U, and randomly generates n+1 cancellation matrix B with n rows and m columns j , j∈[0,η]; among them, the target vector U and the cancellation matrix B j The elements in are all random numbers smaller than the prime number q, j is the serial number of the revocation matrix, and η is the number of digits of the user attribute revocation time;

[0064] The system center performs linear secr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed attribute-based encryption method supporting fine-grit attribute revocation on lattice, and belongs to the field of the information security. The method comprisesthe following steps: at the system initialization stage: the linear secret sharing is performed on a target vector at a system initialization stage, a sub-secret sharing value is served as a privatekey of a corresponding attribute authorization mechanism, and the attribute authorization mechanism establishes the corresponding binary revocation tree for the managed system attribute; at the user attribute key and the update key generation stage: the attribute authorization mechanism obtains the secondary sub-secret sharing value of the user attribute by using secondary linear secret sharing, and the computes the user attribute key and the user attribute update key through a primary image extraction algorithm and a left-sampling algorithm; at the encryption stage: an encryption party computes the ciphertext of the message by using the Gaussian noise, the encrypted and preprocessed noise vector and the system public parameter; at the decryption: a decryption party decrypts the ciphertextby using the user attribute key and the user attribute update key. The method disclosed by the invention is high in security, flexible in access policy and supports the fine-grit attribute permissionrevocation.

Description

technical field [0001] The invention relates to a distributed attribute-based encryption method supporting fine-grained attribute revocation on a lattice. Background technique [0002] The 21st century is the information age. With the rapid development of Internet technologies such as electronic medical care, instant messaging, online shopping, and online video, information is changing human daily life in an unprecedented way. According to the "41st China Internet Statistical Report" released by China Internet Network Information Center (CNNIC), by the end of 2017, the number of Internet users in my country had reached 772 million, and the Internet penetration rate reached 55.8%, 4.1 percentage points higher than the global average. Huge groups of netizens have produced information and data of an unimaginable scale. Therefore, how to realize the safe storage of massive information and data has become an urgent problem to be solved in today's society. The attribute-based enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/085H04L9/0863H04L9/0869
Inventor 张文芳刘旭东王小敏
Owner 芽米科技(广州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products