Data layered encryption device, related electronic device, and storage medium

A technology for encrypting devices and data, applied in the electronic field, can solve the problems of heavy load and the security of the cryptographic system, etc., and achieve the effect of improving efficiency

Active Publication Date: 2021-04-06
SHENZHEN POLYTECHNIC +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The idea of ​​this encryption system was first proposed by Shamir in 1984. IBE technology can effectively save key management and communication costs, but it only has one private key generation center. When the number of users is large, especially in a large-scale distributed environment, Its private key generation center is often overwhelmed by too much load. In addition, if the master private key is obtained by the enemy, the entire cryptographic system will no longer be safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data layered encryption device, related electronic device, and storage medium
  • Data layered encryption device, related electronic device, and storage medium
  • Data layered encryption device, related electronic device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] Hierarchical identity-based encryption (HIBE) is an extension of identity encryption technology. This technology can relieve the load on the trusted key generation center and is more suitable for ensuring data security in a distributed environment. The invention provides a lattice-based server data protection protocol. In terms of efficiency, since the protocol is designed based on the R-LWE difficulty assumption, it has high operating efficiency in the encryption and decryption stages, and the encryption and decryption operations of each bit The number is At the same time, the protocol proposed by the invention is semantically safe for adaptively chosen identity attacks.

[0022] In a layer-1 HIBE protocol, there is also a trusted authority center responsible for generating the master public key and the master private key. Like IBE, the center can use the master private key as the identity 1 The user generates the corresponding private key , while the additional fu...

Embodiment 2

[0046] On the basis of the structure of the above-mentioned embodiment one data layered encryption device, the embodiment of the present invention describes that: if any PPT second user whose security parameter is n The advantage in the following embodiment rules is negligible, then layer 1 HIBE (HIBESetup, HIBEDer, HIBEEnc, HIBEDec) selects identity attack security (ie IND-sID-CPA) under the CPA model.

[0047] Among them, the following first user is the user of the data layered encryption device in the embodiment of the present invention, and the second user is the attacking user of the data layered encryption device in the embodiment of the present invention; the IND-sID-CPA application embodiment rule can describe as follows:

[0048] Target identity determination: the first user will 1 n ,1 l and other public parameters are sent to the second user output a "target" identity vector

[0049] Setup: The first user enters the security parameter n, and runs the maste...

Embodiment 3

[0062] On the basis of the framework of the first embodiment of the data layered encryption device, the embodiment of the present invention describes: the specific setting content of the protocol based on the data layered encryption device, including:

[0063] Let the hash function respectively mapping the corresponding identity to and Two random oracles for elements in , is the upper bound on the norm of the group of Clem-Schmidt orthogonalization vectors of the secret short basis corresponding to the identity vector v(|v|=i), σ i (1≤i≤l) is the Gaussian parameter used to generate the secret short base time, which needs to meet the conditions: for have established.

[0064] An Efficient Layer-1 HIBE Protocol Based on the R-LWE Assumption Can be specifically described as follows:

[0065] ·Random key generation algorithm HIBESetup(1 n ): input security parameter n, integer m≥Cnlgq and m=2 d (d∈Z), a large prime number q=1mod(2m) and the layer number l of the HI...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A data layered encryption device, related electronic device, and storage medium, wherein the data layered encryption device is a group of probabilistic polynomial time PPT modules generated based on a layer 1 identity-based layered encryption HIBE protocol, including: random encryption Key generation module, user private key acquisition module, random encryption module and decryption module.

Description

technical field [0001] The present application relates to the field of electronic technology, and in particular to a data layered encryption device, a related electronic device, and a storage medium. Background technique [0002] With the rapid development and continuous application of emerging technologies such as the Internet of Things and big data, the future world will be a smart world where sensors are fully connected. Whoever holds more data will have greater commercial value. Usually a large amount of valuable data needs to be stored on the cloud server side. In the case of complex and changeable networks and user uncertainties, how to protect the data security of individuals and enterprises on the cloud server side is an important problem that needs to be solved urgently. There are usually many measures to ensure the security of server data, such as access control policies, data encryption protocols, and methods such as adding a bastion host. Layered encryption prot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08G06F21/60
CPCG06F21/602H04L9/0869H04L63/0442
Inventor 王廷孙志伟徐光青
Owner SHENZHEN POLYTECHNIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products