Unlock instant, AI-driven research and patent intelligence for your innovation.

Content security sharing method and system based on proxy re-encryption

A proxy re-encryption, content security technology, applied in the field of lightweight content security sharing based on proxy re-encryption, can solve the problem of inflexible access control, high algorithm complexity, and the original ciphertext does not have large-scale access control functions, etc. question

Active Publication Date: 2020-07-14
SHANGHAI JIAOTONG UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its shortcomings are: the original ciphertext is not obtained through attribute-based encryption, so the original ciphertext does not have large-scale access control functions; and it does not provide a decryption method for the original ciphertext and re-encrypted ciphertext
Its shortcoming is: the access control is not flexible, it only supports the access structure connected with the "AND" gate, and it can't do anything about the "OR" logic or threshold control
Its shortcoming lies in: the complexity of the algorithm is high, and the efficiency is low in practical application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Content security sharing method and system based on proxy re-encryption
  • Content security sharing method and system based on proxy re-encryption
  • Content security sharing method and system based on proxy re-encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The present invention will be described in detail below with reference to specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that, for those skilled in the art, several changes and improvements can be made without departing from the inventive concept. These all belong to the protection scope of the present invention.

[0066] like figure 1 As shown, according to a kind of content security sharing method based on proxy re-encryption provided by the present invention, three types of entities: key server, user (including file owner, file recipient and shareee) and cloud server, according to the following steps accomplish:

[0067] Step 1) Initialization step: the key server determines the basic information of the system, initializes the system, generates the system public parameters and the system master key respectively, and s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a content safe sharing method and system based on proxy re-encryption. A key server generates a public parameter and a system main key, and sends the public parameter to a system user; the key server generates a user private key and sends the user private key to each system user; a file uploading channel is provided to upload a file to a cloud server; the cloud server receives file ciphertext, keyword ciphertext, and a first layer of ciphertext; a file receiving end performs attribute-based decryption on the first layer of ciphertext; the cloud server searches ciphertext; the file receiving end receives the file ciphertext and decrypts, makes an access policy and generates a re-encryption key; and the cloud server re-encrypts the first layer of ciphertext by using the re-encryption key and then sends the encrypted first layer of ciphertext to a file sharing end. The invention provides a light, keyword search-supporting attribute-based proxy re-encryption method,so that massive original ciphertext and re-encrypted ciphertext can be accessed and controlled, a flexible access policy is supported, sharing efficiency is improved, and calculation burden of encryption and decryption is relieved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method and system for content security sharing based on proxy re-encryption, and in particular to a lightweight content security sharing method based on proxy re-encryption for large-scale users. Background technique [0002] With the development and popularization of cloud computing, the security of user data faces new threats and challenges. Because the number of users in the cloud environment is large, and the data management rights belong to third-party servers, users generally encrypt data before uploading in order to protect their privacy and data security. But when the data is encrypted, traditional access control, file search and sharing techniques are no longer applicable. In order to effectively realize the access control, file search and sharing of encrypted data, a variety of new cryptosystems have been proposed one after another. Among them, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08H04L9/06
CPCH04L9/0631H04L9/0637H04L9/0643H04L9/085H04L9/0861H04L9/0869H04L63/0281H04L63/06H04L63/10H04L63/20H04L67/06H04L67/10
Inventor 张爱新钱中天李强李建华
Owner SHANGHAI JIAOTONG UNIV