Attribute-based anti-collusion attack proxy re-encryption method

A technology of proxy re-encryption and collusion attack, which is applied in the countermeasures of attacking encryption mechanism, the usage of multiple keys/algorithms, and the public key of secure communication. attack and other issues, to achieve the effect of safe sharing and guarantee safe sharing

Active Publication Date: 2019-12-31
HUAIBEI NORMAL UNIVERSITY
View PDF10 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing attribute proxy re-encryption schemes are based on a difficult assumption in number theory, which is difficult to resist quantum attacks. One party's private key, so it cannot resist collusion attacks; finally, the existing attribute proxy re-encryption scheme has a large computational cost, a single function and only theoretical significance, and cannot be applied to complex actual environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based anti-collusion attack proxy re-encryption method
  • Attribute-based anti-collusion attack proxy re-encryption method
  • Attribute-based anti-collusion attack proxy re-encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] The attribute-based proxy re-encryption method provided in this embodiment includes the following six modules:

[0041] 1. System parameter setting module Setup(1 n ): Enter security parameter 1 n , to generate a system public parameter params and a master private key MSK.

[0042] 2. Private key generation module KeyGen(params,MSK,L): For an attribute list L, input params and MSK to generate a private key SK L and the corresponding public key PK L .

[0043] 3. The encryption module Encrypt(params,L,PK L ,(W,ρ),M): input params, L, PK L , accessing the structure (W, ρ) and the message M, the algorithm returns a ciphertext

[0044] 4. Re-key generation module Enter params, attribute list L 1 , L 2 and the property list L 1 key of The algorithm returns the re-encryption key

[0045] 5. Re-encryption module Enter params, New access structure (W',ρ') and property list L 1 corresponding ciphertext The algorithm returns L after re-encryption 2 corre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attribute-based anti-collusion attack proxy re-encryption method, which relates to the technical field of data encryption, and comprises a system parameter setting module forinputting a security parameter 1<n> and generating a system public parameter params and a main private key MSK; a private key generation module for inputting params and MSK into an attribute list L to generate a private key SK<L> and a corresponding public key PK<L>; an encryption module for inputting params, L, PK<L>, an access structure (W, rho) and a message M, wherein the algorithm returns ciphertext; a re-key generation module for inputting params, attribute lists L1, l2 and the secret key of the attribute list L1, wherein the algorithm returns the re-encryption secret key shown in the description; a re-encryption module for inputting the params, a new access structure (W', rho') and the ciphertext corresponding to the attribute list L1, wherein the algorithm returns the ciphertext corresponding to the re-encrypted L2; and a decryption module for inputting the params, the ciphertext C<L> and the private key SK<L>, wherein the algorithm returns a message M or a terminator T upsidedown. The proxy re-encryption method has the characteristics of quantum attack resistance, unidirectionality, reusability and collusion attack resistance.

Description

technical field [0001] The invention relates to the technical field of data encryption, in particular to an attribute-based anti-collusion attack proxy re-encryption method. Background technique [0002] In recent years, cloud computing has developed rapidly. Through cloud computing technology, users can store data through the cloud anytime and anywhere. At present, user data is mainly stored in the third-party cloud service provider CSP. However, while users enjoy the convenience of cloud services, they also face many problems. For example, user data will be stored in untrusted third-party cloud access, so that the confidentiality of user data cannot be guaranteed. Therefore, in a cloud storage environment, a mechanism is needed to enable the cloud server to directly convert the user's encrypted data into another shared user's encrypted data without obtaining the user's plaintext data. [0003] Due to its own characteristics, attribute proxy re-encryption is very suitable...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/14H04L9/08H04L9/00H04L29/06
CPCH04L9/3006H04L9/14H04L9/0861H04L9/002H04L63/0478H04L63/0471H04L63/0442
Inventor 江明明郭宇燕王艳侯金秋余磊
Owner HUAIBEI NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products