Distributed multi-authorization-party ciphertext policy attribute-based encryption method for medium confusion

A technology of attribute-based encryption and ciphertext strategy, applied in the field of cloud computing security, which can solve problems such as collusion attacks

Active Publication Date: 2019-08-02
FUJIAN NORMAL UNIV
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, malicious users have the opportunity to collect decryptio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed multi-authorization-party ciphertext policy attribute-based encryption method for medium confusion
  • Distributed multi-authorization-party ciphertext policy attribute-based encryption method for medium confusion
  • Distributed multi-authorization-party ciphertext policy attribute-based encryption method for medium confusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0037] Please refer to figure 1, the present invention provides a distributed multi-authorized party ciphertext policy attribute-based encryption method for media confusion, and provides a system including a public parameter setting server, a data owner Do, a cloud storage server Css, a data user DU, and a media MDR, including The following steps:

[0038] Step S1: Input security parameter 1 in the public parameter setting server λ , get the public parameter PP and the pseudo-random function PRF(·); establish L attribute authorization centers Per property authority Manage the corresponding property set And establish a trusted medium between the data owner and the data user, generate a pseudo-random function PRF( ) and send it secretly to all attribute authorization centers (AAs) and the medium;

[0039] Step S2: The attribute authorization cente...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a distributed multi-authorization-party ciphertext policy attribute-based encryption method for medium confusion, which is characterized in that when a new attribute authorization center is added into a system, the new attribute authorization center is secretly distributed with a pseudorandom function PRF (.). In order to prevent collusion of users who possess all relevantattributes in a certain relevant attribute management domain, a trusted medium (MDR) is employed in this system. A data owner generates a ciphertext CT including a obfuscation function. Because the secure DO is used, online interaction does not need to be maintained. Similarly, the DO transmits a key to the MDR, where the key is a function variable for receiving a key skU obtained by the user U from the MDR. The skU is calculated from a PRF (.), a GidU of U, or the like. U has the ability to calculate a function, but does not reveal the internal program secret. Wherein I represents a set of AAs serial numbers of an attribute authorization center for managing U attributes, if the identity IDU of U is confirmed, a corresponding private key USKj is issued to the user U, and the MDR sends a private key skU to the user U. And finally, the U decrypts the ciphertext CT by using USKj (j belongs to I).

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a distributed multi-authorized party ciphertext policy attribute-based encryption method for media confusion. Background technique [0002] Cloud computing is a new type of computing architecture with a wide range of applications. More and more organizations or applications require dynamic management. To solve the problem of fine-grained access control in cloud environments, Sahai and Waters proposed attribute-based encryption (ABE), where user identity is determined by its attributes. ABE is applied to one-to-many encryption situations, where data is encrypted according to a certain attribute-related access strategy and can be decrypted by any user whose attributes satisfy the access strategy. The ABE scheme with only one authorization center has the problem of over-centralization of power and will reduce security. In order to avoid this problem, the multi-at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/08
CPCH04L9/0861H04L67/1097
Inventor 李继国张亦辰胡声洲
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products