Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attribute revocation method

A technology of attributes and algorithms, applied in the field of data security, which can solve problems such as a large amount of computation, updating proxy keys, etc.

Active Publication Date: 2019-08-06
XI AN JIAOTONG UNIV
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this solution is only applicable to the case where the number of related users is small. When the number of related users is relatively large, it needs to consume a lot of calculations to update the proxy key.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute revocation method
  • Attribute revocation method
  • Attribute revocation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0106] The invention provides a method for revocation of attributes. Firstly, a reasonable organization method of user space is proposed, and these users are randomly divided into irrelevant groups. The revocation of user rights only affects other users in the group. The number of affected users is the number of active users in the group. The more groups are divided, the fewer active users are assigned to each group, and the fewer other users are affected. However, the smaller the group size, the larger the storage overhead required. Therefore, the division of groups depends on the specific circumstances of the use of attributes.

[0107] On the other hand, with the increase of attribute usage time, the proportion of the number of users in the depleted user set in the group it belongs to is on the rise. The present invention introduces a minimum coverage mechanism. What is stored in the revoked user group is a group identification code that can represent a user group instead ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attribute revocation method. A tree-shaped user space organization mode is used to define that the user identity identification code is a character string consisting of 0\ 1characters; the identity identification codes of all users have the same length m; the user identity space is a global I composed of all possible user identity identification codes; the size of the domain is 2m; groups are divided according to attribute use conditions; the users are randomly divided into irrelevant groups; the minimum coverage mechanism is introduced, a reduced user group is organized by using a minimum coverage group mechanism; the group identification code representing one user group is stored in the revoked user group, a combination mechanism is introduced, the adjacent groups are combined into one group when no user enters the user group with the revoked authority, and the proxy key of the user and the interpolation factor of the reduced user group are updated to complete attribute revocation. According to the method, collusion attacks can be resisted, and the confidentiality of the data and the forward and backward security of the data are ensured.

Description

technical field [0001] The invention belongs to the technical field of data security, and in particular relates to an attribute revocation method. Background technique [0002] The problem of attribute revocation has always been a research point that has attracted much attention in the attribute encryption mechanism. When revoking a user or a user's attribute, it is necessary to ensure that the user no longer has the permission corresponding to the attribute, while the permissions of other users are not affected. [0003] In recent years, scholars at home and abroad have proposed various attribute reduction schemes. Combining attribute-based encryption scheme and multicast encryption technology, Attrapadung et al. proposed that current attribute revocation schemes can be divided into two categories: direct revocation mode and indirect revocation mode. [0004] In the direct revocation mode, the revocation list is embedded into the ciphertext by the sender to directly reali...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0643H04L9/0861H04L9/0891
Inventor 张选平樊兴王嘉寅
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products