Weight attribute-based encryption method based on hierarchical authorities

A technology of attribute-based encryption and authorization authority

Active Publication Date: 2018-11-23
上海汉枫电子科技有限公司
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the authority and attribute structures in the traditional ABE mechanism are not hierarchical, all attributes enjoy the same secur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weight attribute-based encryption method based on hierarchical authorities
  • Weight attribute-based encryption method based on hierarchical authorities
  • Weight attribute-based encryption method based on hierarchical authorities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] based on the following figure 1 Preferred embodiments of the present invention will be described in detail.

[0067] like figure 1 As shown, the present invention provides a kind of weight attribute base encryption method based on hierarchical authority, comprising the following steps:

[0068] Step S1, when the central authority CA is initialized, a system public key and a system master key are generated;

[0069] Step S2, authorize the representative attribute authority AA of different levels, and generate the master key of the representative attribute authority AA of the corresponding level;

[0070] Step S3, the central authority CA and the representative attribute authority AA distribute the user system private key and the user private key to the user, and the combination of the two generates the user's total key; wherein, AA generally refers to AA of different levels;

[0071] Step S4, the data owner encrypts the data file through two stages of online encryptio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A weight attribute-based encryption method based on hierarchical authorities is disclosed. A system public key and a system master key are generated when a central authority (CA) is initialized, master keys of corresponding levels of representative attribute authorities (AAs) are generated by authorization of different levels of AAs, the CA and the representative AAs generate total keys of corresponding users for the users, a data owner encrypts a data file through two stages of on-line encryption and off-line encryption, a cipher text is generated and uploaded to a cloud server for storage, auser sends an access request to the cloud server to obtain the cipher text data stored in the cloud server, and the user decrypts the cipher text data obtained from the cloud server to obtain the plain text data to be shared by the data owner. By introducing the hierarchy and attribute weights of the authorities, the encryption system has better flexibility in the cloud storage environment, finer-grained access control can be implemented, and the security of the stored data is improved.

Description

technical field [0001] The invention relates to the technical fields of cloud environment and cryptography, in particular to a weight attribute-based encryption method based on a hierarchical authority. Background technique [0002] With the large-scale deployment of cloud storage systems, a large amount of sensitive data is outsourced to cloud storage servers. However, the data outsourcing storage mode also brings some security issues. For example, in order to obtain certain benefits or out of curiosity, the cloud server can disclose the private data of users or enterprises to third parties without the authorization of users. . Therefore, attribute-based encryption (ABE for short) has become a research hotspot in recent years. Most of the early ABE schemes are aimed at a single authority, and all user private keys are distributed by the only authority, which greatly increases the burden on the authority. Moreover, in the context of existing cloud environments, early encr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04L29/08
CPCH04L9/0825H04L63/0478H04L67/1097
Inventor 田秋亭韩德志王军蒋雁梅
Owner 上海汉枫电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products