Unlock instant, AI-driven research and patent intelligence for your innovation.

Attribute-Based Encryption Method and System for Traceable and Revokable Malicious Users with Policy Hiding

An attribute-based encryption and malicious user technology, which is applied in the field of information security, can solve the problems of private key leakage, the user who leaks the decryption key cannot be identified, and user privacy is leaked.

Active Publication Date: 2021-03-05
SHANGHAI MARITIME UNIVERSITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the access policy may also contain sensitive information, which may leak the user's privacy, so it is necessary to hide the access policy to achieve privacy protection
However, in the ABE (Attribute-BaseEncryption) system, there are also some legitimate users who will disclose their private keys to third parties. Since the decryption key is associated with the attribute, the user who leaks the decryption key cannot be determined. Therefore, it is necessary to apply the tracking mechanism to the traditional attribute-based encryption scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-Based Encryption Method and System for Traceable and Revokable Malicious Users with Policy Hiding
  • Attribute-Based Encryption Method and System for Traceable and Revokable Malicious Users with Policy Hiding
  • Attribute-Based Encryption Method and System for Traceable and Revokable Malicious Users with Policy Hiding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0084] The present invention provides an attribute-based encryption method that can trace and revoke malicious users with policy hiding, such as figure 1 shown, including the steps:

[0085] S1. The authority 1 establishes a user set U and a binary tree T, and assigns a node value to each node of the binary tree T; a leaf node of the binary tree T is associated with a user 4 in the user set U; the authority 1 defines a user revocation list R , bilinear mappin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an attribute-based encryption method that can trace and revoke malicious users with hidden policies, including steps: S1, the authorization mechanism generates public parameters PP, user revocation lists R, and reserved system master keys MSK; S2, the authorization mechanism establishes and includes System attribute name set A, system attribute value set T′ system attribute set, data owner defines access policy W based on system attribute set; S3, data owner passes encryption algorithm according to PP, W, message m, R to be encrypted, Generate the ciphertext CT containing R and the incomplete access policy, and store CT in the cloud storage; S4. The authority generates a decryption key SK for user u; S5. User u decrypts CT through SK, only when user u is not in R , and the user u can decrypt and obtain m only when the matching verification of CT is passed; S6, the authority tracks the malicious user based on SK and PP, and updates R; S7, the cloud storage updates CT based on the updated R and the updated key X' . The invention protects user privacy through incomplete access policies, and can track and revoke malicious users.

Description

technical field [0001] The invention relates to the field of information security, in particular to an attribute-based encryption method for policy hiding that can trace and revoke malicious users. Background technique [0002] With the development of cloud computing technology, cloud storage system provides users with convenient data storage services, but as users outsource more and more sensitive data to cloud storage, data security issues and user privacy protection become a problem. Therefore, it is necessary to encrypt outsourced sensitive data, but how to achieve fine-grained access to shared data has also become a difficult problem for cloud storage services. [0003] Attribute-based encryption technology can ensure data security while realizing fine-grained access to shared data. There are two types of attribute-based encryption: key-policy attribute-based encryption (KP-ABE) and ciphertext-policy attribute-based encryption (CP-ABE). In CP-ABE, the ciphertext is re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62H04L9/08H04L29/06H04L29/08
CPCG06F21/602G06F21/604G06F21/6245H04L9/0861H04L9/0891H04L63/101H04L67/1097H04L2209/16
Inventor 潘楠楠韩德志
Owner SHANGHAI MARITIME UNIVERSITY