Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Distributed Ciphertext Policy Attribute-Based Encryption Method with Hidden Access Structure

A technology of attribute-based encryption and access structure, applied in the field of distributed ciphertext policy attribute-based encryption that hides the access structure, can solve the problems of users leaking sensitive information, stealing users' private information, ciphertext computing overhead and length growth, etc. Achieve the effect of protecting privacy and resisting collusion attacks

Active Publication Date: 2021-11-05
FUJIAN NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are three main problems in the traditional ciphertext policy attribute-based encryption scheme, that is, the access structure embedded in the ciphertext may leak sensitive information of the user, the computational overhead and length of the ciphertext increase linearly with the complexity of the access structure, and malicious Collusion of authorized agencies may steal users' private information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Distributed Ciphertext Policy Attribute-Based Encryption Method with Hidden Access Structure
  • A Distributed Ciphertext Policy Attribute-Based Encryption Method with Hidden Access Structure
  • A Distributed Ciphertext Policy Attribute-Based Encryption Method with Hidden Access Structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0034] It should be pointed out that the following detailed description is exemplary and is intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0035] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a distributed ciphertext policy attribute-based encryption method that hides the access structure, and protects the user's privacy from the following two aspects: (1) The user obtains the private key of its attribute from different authorized organizations, and these authorized organizations The user's global identifier and attributes are unknown; (2) The access structure in the ciphertext is completely hidden. Furthermore, the method of the present invention is resistant to collusion attacks due to the non-linear binding between the user's global identifier and private keys from various authorities.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a distributed ciphertext policy attribute-based encryption method with hidden access structure. Background technique [0002] Traditional Identity-Based Encryption (IBE) provides a one-to-one communication mode, that is to say, one user in the system encrypts, and only a specific user can correctly decrypt the ciphertext. The sender of the message needs to know the identity of the receiver before encrypting the message, which cannot meet the complex needs of users in practical applications. For example, when the sender needs to send encrypted messages to multiple different people, under the identity-based cryptographic system, the sender needs to obtain the public key of each receiver in advance, and use different public keys to pair the same message one by one. encrypted, and then sent to the corresponding receiver. This complex and inefficient way is difficul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0869H04L63/0407H04L63/06H04L63/10H04L63/20
Inventor 张亦辰李继国
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products