Traceable layered multi-authorization ciphertext policy attribute base authentication method

A technology of ciphertext strategy and authentication method, applied in the field of cloud computing security, can solve the problems of inflexible description method and system resource consumption.

Active Publication Date: 2019-08-09
FUJIAN NORMAL UNIV
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the ABA scheme based on group signatures has the following defects: the description of attribute requirements in the authentication process is not flexible enough; when the attribute requirements change, the entire system must be rebuilt, which will cause additional system resource consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traceable layered multi-authorization ciphertext policy attribute base authentication method
  • Traceable layered multi-authorization ciphertext policy attribute base authentication method
  • Traceable layered multi-authorization ciphertext policy attribute base authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0052] It should be pointed out that the following detailed description is exemplary and is intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0053] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a traceable layered multi-authorization ciphertext policy attribute base authentication method. A central authorization mechanism generates a main public / private key of a system, a private key of a zero-level authorization mechanism and a private key of a signer; the upper-level attribute authorization mechanism authorizes the next-level attribute authorization mechanism,and the attribute authorization mechanisms of different levels can generate attribute keys for signers according to the managed attribute sets and then send the attribute keys to the signers; a signerin the system owns a private key and an attribute key, signs a message by using the attribute key of the signer, and sends signature information of the message to a verifier; the verifier verifies whether the signature is valid or not by using the attribute public key of the signer; when there is a dispute in the system, the tracker is responsible for recovering the identity information of the signer from the signature. According to the method, the privacy of the user can be protected, collusion attacks of multiple authorization mechanisms can be resisted, and the method is safe and efficient.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a traceable hierarchical multi-authorization ciphertext policy attribute-based authentication method. Background technique [0002] The attribute-based encryption (ABE) scheme uses a set of descriptive attributes to represent the user's identity, and different users can have the same set of attributes, so it has the advantage of one-to-many encryption, making it more effective in access control to encrypted data. It is considered to be one of the most promising technologies. ABE can only ensure that users who satisfy the access structure can correctly perform decryption operations, and cannot provide any mechanism for user legality authentication. The Attribute-Based Authentication (ABA) system can realize the process of authenticating the user's legitimacy, and will not disclose any identity information of the signer during the authentication process. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/00
CPCH04L9/002H04L9/0863H04L9/0869H04L9/3226H04L9/3247
Inventor 李继国张亦辰
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products