Ciphertext fixed-length encryption transmission mechanism based on outsourcing decryption

A technology for encrypted transmission and ciphertext, applied in transmission systems, digital transmission systems, and key distribution, it can solve problems such as insufficient data security, and achieve the effects of constant ciphertext length, reduced storage overhead, and reduced computational loss.

Inactive Publication Date: 2019-07-26
NANJING UNIV OF TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problem of insufficient data security in industrial control systems, the present invention proposes an encrypted transmission mechanism based on outsourced decryption and fixed-length ciphertext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext fixed-length encryption transmission mechanism based on outsourcing decryption
  • Ciphertext fixed-length encryption transmission mechanism based on outsourcing decryption
  • Ciphertext fixed-length encryption transmission mechanism based on outsourcing decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solutions in the embodiments of the present invention will be described in detail below in conjunction with the drawings in the embodiments of the present invention.

[0043] Refer to attached figure 2 The system flowchart of utilizing PBC storehouse to realize encryption algorithm mechanism of the present invention, its concrete steps are as follows:

[0044] S1, system initialization executes the following steps;

[0045] S11. Select a collision-resistant hash function H: {0, 1} * → Z p and the multiplicative cyclic group G of order p 1 , G 2 and the bilinear map e:G 1 ×G 1 →G 2 , choose G randomly 1 The generator g and element u of are respectively:

[0046] g=[5462914575314910590899595955490751713417048187311079632287396095786480298716526511614994896345956642734944823690767827421117215770549253192224569035233452,774195115381166943636557825206697372937224623949952927327661375336756007822971757280098332598279643808036816208927255781467190519068...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a ciphertext fixed-length encryption transmission mechanism based on outsourcing decryption, and relates to the field of attribute encryption. The mechanism comprises an authorization center, an industrial control system, a data user, a public cloud and a private cloud. According to the mechanism, plaintext data in an industrial control system are encrypted by utilizing anattribute-based encryption algorithm, so that the integrity and confidentiality of the data are effectively protected. An outsourcing decryption technology with verification is used for outsourcing alarge amount of calculation expenditure to a trusted third party, so that the calculation consumption of the user side is reduced, and meanwhile, the correctness of decrypted data can be verified. Inaddition, due to the constant ciphertext length, the storage overhead of the user side is reduced, and the communication cost of the system is greatly saved.

Description

technical field [0001] The invention relates to the field of attribute encryption, in particular to an auxiliary encryption transmission mechanism suitable for industrial control systems. Background technique [0002] With the accelerated integration of industrial control system (Industrial Control System, ICS) and information technology (Information Technology, IT), the original independent and closed industrial control system began to use cloud computing, big data and other technologies for data storage and analysis. In this process, the industrial control system is faced with various threats from external networks, such as malicious intrusion, computer virus, network attack, etc. The most famous one is the Iran "Stuxnet" virus incident in 2010. In traditional industrial control systems, data is transmitted in plain text. If the plain text data is directly sent and stored on the cloud platform, it may lead to data leakage, tampering and other threats, resulting in irrepara...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0863H04L9/0869H04L63/0428H04L63/061H04L63/10
Inventor 苏清健屠袁飞邹明霞尚钰焜孙浩
Owner NANJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products