Unlock instant, AI-driven research and patent intelligence for your innovation.

A Traceable Hierarchical Multi-Authorization Ciphertext Policy Attribute-Based Authentication Method

A technology of ciphertext policy and authentication method, which is applied in the field of cloud computing security, can solve problems such as inflexible description methods and system resource consumption, and achieve the effect of efficient data fine-grained access control

Active Publication Date: 2021-09-28
FUJIAN NORMAL UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the ABA scheme based on group signatures has the following defects: the description of attribute requirements in the authentication process is not flexible enough; when the attribute requirements change, the entire system must be rebuilt, which will cause additional system resource consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Traceable Hierarchical Multi-Authorization Ciphertext Policy Attribute-Based Authentication Method
  • A Traceable Hierarchical Multi-Authorization Ciphertext Policy Attribute-Based Authentication Method
  • A Traceable Hierarchical Multi-Authorization Ciphertext Policy Attribute-Based Authentication Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0052] It should be pointed out that the following detailed description is exemplary and is intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0053] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a traceable layered multi-authorization ciphertext policy attribute-based authentication method, the master / private key of the system generated by the central authority, the private key of the 0th level authority and the private key of the signer; the superior attribute authority Authorized to the next-level attribute authority, attribute authorities of different levels can generate attribute keys for signers according to the set of attributes they manage, and then send attribute keys to signers; signers in the system have private keys and attributes key, the signer signs the message with his own attribute key, and sends the signature information of the message to the verifier; the verifier uses the signer's attribute public key to verify whether the signature is valid; when there is a dispute in the system, the tracker Responsible for recovering the identity information of the signer from the signature. The invention can realize the protection of user's privacy, and can also resist collusion attacks of multiple authorized institutions, and is safe and efficient.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a traceable hierarchical multi-authorization ciphertext policy attribute-based authentication method. Background technique [0002] The attribute-based encryption (ABE) scheme uses a set of descriptive attributes to represent the user's identity, and different users can have the same set of attributes, so it has the advantage of one-to-many encryption, making it more effective in access control to encrypted data. It is considered to be one of the most promising technologies. ABE can only ensure that users who satisfy the access structure can correctly perform decryption operations, and cannot provide any mechanism for user legality authentication. The Attribute-Based Authentication (ABA) system can realize the process of authenticating the user's legitimacy, and will not disclose any identity information of the signer during the authentication process. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/00
CPCH04L9/002H04L9/0863H04L9/0869H04L9/3226H04L9/3247
Inventor 李继国张亦辰
Owner FUJIAN NORMAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More