Efficient searchable access control method based on hidden strategy CP-ABE

A CP-ABE, access control technology, applied in the field of efficient searchable access control based on hidden policy CP-ABE, which can solve problems such as key length performance limitations

Active Publication Date: 2019-09-10
UNIV OF ELECTRONIC SCI & TECH OF CHINA +1
View PDF10 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above patents are based on the original CP-ABE method, which is limited by perf

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient searchable access control method based on hidden strategy CP-ABE
  • Efficient searchable access control method based on hidden strategy CP-ABE
  • Efficient searchable access control method based on hidden strategy CP-ABE

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the implementation methods and accompanying drawings.

[0061] see figure 1 , in the efficient searchable access control method based on the concealment strategy CP-ABE of the present invention, the cloud server (Cloud Service Provider, CSP) performs parameter initialization according to the user attribute set, and generates a public key and a master key for encrypting data; The data owner (Data Owner, DO) encrypts its uploaded data and self-selected search keywords according to the self-selected access strategy and public key, and sends the ciphertext to the cloud server, and sends the keyword ciphertext to the search server; when After the data visitor (Data User, DU) makes an access request to the cloud server, the cloud server generates its private key according to the attributes of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient searchable access control method based on a hidden strategy CP-ABE, which belongs to the field of information security. The method is based on a public key and a main key which are generated by a cloud server and are used for encrypting data. A data owner encrypts the uploaded data and the optional search keywords respectively according to the optional access strategy and the public key, sends the ciphertext to the cloud server and sends the keyword ciphertext to the search server. After the data visitor makes an access request to the cloud server, the cloud server generates a private key according to the attribute of the visitor and sends the private key to the visitor. The visitor encrypts the selected search keyword by using the private key to generate a keyword trap door, and sends the keyword trap door to the search server for ciphertext search; the search server returns the matched ciphertext number to the visitor through the cloud server; andthe visitor decrypts the ciphertext according to the private key of the visitor, and if the access strategy is met, decryption can be successfully carried out. The method is low in operation cost andhigh in operation efficiency.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to an efficient searchable access control method based on a hidden policy CP-ABE (CiphertextPolicy Attribute Based Encryption, ciphertext policy attribute based encryption system). Background technique [0002] With the popularization and promotion of cloud computing technology, more and more data began to be migrated to cloud servers. In today's widely used cloud environment, there are geographical isolation and complex relationships between different types of users. In the cloud environment, users need to achieve safe sharing of files and data. Some of these data are highly confidential and Private data with security guarantee requirements. Cloud service providers need to provide cloud-specific security assurance solutions for this type of data. The traditional public key cryptosystem is difficult to adapt to the distributed environment of cloud services, and cann...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/0861H04L63/10H04L67/06
Inventor 李发根代强范泽宇罗朝园王欣洲
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products