Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Proxy revocation-based key strategy attribute base encryption method

An attribute-based encryption and attribute-based technology, applied in key distribution, can solve the problems of large ciphertext space, update key and ciphertext, etc., and achieve the effect of improving revocation efficiency

Inactive Publication Date: 2019-01-29
SHANGHAI MARITIME UNIVERSITY
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are many existing revocation schemes, but most schemes in the indirect revocation mode have problems such as revocation delay, large ciphertext space, or the need to update keys and ciphertexts.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy revocation-based key strategy attribute base encryption method
  • Proxy revocation-based key strategy attribute base encryption method
  • Proxy revocation-based key strategy attribute base encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] based on the following figure 1 and figure 2 , specifically explain the preferred embodiment of the present invention.

[0060] Aiming at the existing problems of indirect revocation, the present invention introduces the revocation list of all attributes held by the third-party authorization organization, and binds the user revocation list information of any number of attributes in the ciphertext, and the data receiver needs to The encrypted ciphertext is decrypted, enabling fine-grained agent-based instant attribute revocation.

[0061] Such as figure 1 As shown, the present invention provides a key policy attribute-based encryption method based on agent revocation, comprising the following steps:

[0062] Step S1, the authority inputs the security parameters, the number of users m and the possible value n of the largest number of attributes in the ciphertext attribute set, calls the system initial setting algorithm, and generates the system public key PK and syste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a proxy revocation-based key strategy attribute base encryption method. According to the method, an authorization mechanism invokes a system initial setting algorithm, generates a system public key, sends the system public key to a data sender, generates a system master key, and sends the system master key to a revocation proxy server; the authorization mechanism invokes akey generation algorithm, generates a user private key, sends the user private key to a data receiver, and invokes a proxy revocation key generation algorithm, generates a proxy revocation key, and sends the proxy revocation key to a revocation proxy server; the revocation proxy server invokes a proxy ciphertext conversion algorithm to generate a ciphertext for attribute revocation operation andsends the ciphertext to the data receiver; the data sender invokes an encryption algorithm to generate a ciphertext and sends the ciphertext to the revocation proxy server; and the data receiver invokes a decryption algorithm to output a plaintext. According to the method of the invention, a revocation list of all attributes held by a semi-trusted third-party authorization institution is introduced, user revocation list information of a plurality of attributes is bound in the ciphertext, and therefore, a fine-granularity instant attribute revocation scheme is realized, and the revocation efficiency of user attributes is improved.

Description

technical field [0001] The invention relates to a key policy attribute-based encryption method based on proxy revocation. Background technique [0002] In the field of computer development, data security and legal access cannot be guaranteed, and the transmission of a large amount of information and data may have privacy leaks at any time. Therefore, how to store data safely and efficiently, share data and process Data is a top priority for data integrity and security. [0003] Attribute-based encryption technology uses attribute sets to represent users, and encrypts them, only users with specific attributes can successfully decrypt them. Attribute-based encryption is divided into key-policy attribute-based encryption (KP-ABE) and ciphertext-policy attribute-based encryption (CP-ABE). In the practical application of attribute-based encryption technology, there are problems such as attribute expiration and change, which need to be revoked. The attribute revocation mechanism...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06F21/60G06F21/62
CPCH04L9/083H04L9/088G06F21/602G06F21/606G06F21/6245
Inventor 潘楠楠韩德志俞云萍路雪
Owner SHANGHAI MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products