Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Access control system and method supporting cross-domain data sharing and wireless communication system

A data sharing and access control technology, applied in wireless communications, digital transmission systems, transmission systems, etc., can solve problems such as low user decryption efficiency, data access control, inability to achieve one-to-many, and data sharing for specific groups, etc.

Active Publication Date: 2019-12-31
XIDIAN UNIV
View PDF6 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the existing solutions still have not completely solved how to use attribute-based encryption to realize cross-domain data sharing and access control; (1) different management strategies are used between different domains, that is, the same identity is identified differently between different domains, How to complete identity authentication between different domains is a technical problem
(2) On the premise of realizing cross-domain data sharing, how to realize one-to-many data sharing and how to share data to a specific group is a technical problem
(3) In attribute-based encryption, different users may share attribute private keys and decrypt ciphertexts in the form of collusion. How to resist collusion attacks is a technical problem
(4) Using attribute-based encryption, due to the use of bilinear pairings, the user's decryption efficiency is low. How to improve the user's decryption efficiency is a difficult problem
[0007] (1) The existing solution uses different management strategies between different domains, that is, the same identity is marked differently between different domains, resulting in difficulties in cross-domain authentication
[0008] (2) On the premise of achieving cross-domain data sharing, the existing solutions cannot realize one-to-many and data sharing for specific groups
[0009] (3) In the existing scheme of attribute-based encryption, different users may share the attribute private key, so that unauthorized users can also decrypt the ciphertext by means of collusion
[0010] (4) The existing scheme uses attribute-based encryption, and due to the use of bilinear pairing, the user's decryption efficiency is low
[0011] Difficulty in solving the above technical problems: (1) The technical bottleneck of cross-domain data sharing mainly lies in the identity authentication between different domains, which is an important reason for the difficulty in implementing cross-domain sharing technology
(2) How to perform one-to-many sharing of cross-domain data and how to control data access are also important reasons why cross-domain sharing cannot be used flexibly
(3) Due to the use of bilinear pairing, attribute-based encryption leads to extremely low user decryption efficiency, which is an important reason for its difficulty in practical application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control system and method supporting cross-domain data sharing and wireless communication system
  • Access control system and method supporting cross-domain data sharing and wireless communication system
  • Access control system and method supporting cross-domain data sharing and wireless communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0073] Aiming at the problems existing in the prior art, the present invention provides an access control system and method supporting cross-domain data sharing, and a wireless communication system. The present invention will be described in detail below with reference to the accompanying drawings.

[0074] Such as figure 1 As shown, the embodiment of the present invention provides an access control system supporting cross-domain data sharing including:

[0075] Domain A user initialization module 1, used to realize the generation of the user's ECC public key / private key pair;

[0076] Domain B initialization module 2 is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of wireless communication networks, and discloses an access control system and method supporting cross-domain data sharing, and a wireless communication system. Users needing to share data in a domain A select elliptic curve parameters to generate ECC key pairs; a global authentication center CA of the domain B generates a global public parameter; the proxy node in the domain B encrypts the system public key and the attribute set by using the ECC public key of the domain A user; the domain A user decrypts the data from the domain B by using the ECCprivate key of the domain A user and uploads the data to the public cloud; the legal user sends a file access request to the public cloud; and when user revocation occurs, the proxy server searches acorresponding attribute private key list according to the global identifier of the user and deletes the attribute private key list. The method is high in safety under the condition of the same secretkey length. The method gives full play to the characteristic of strong computing power of agent nodes, completes the preprocessing of some data, helps a user to carry out partial decryption, and improves the decryption efficiency of the user.

Description

technical field [0001] The invention belongs to the technical field of wireless communication networks, and in particular relates to an access control system and method supporting cross-domain data sharing, and a wireless communication system. Background technique [0002] For the security and unified management of network resources, computer networks are always divided into many independent autonomous management domains. In different domains, users and resources are managed using different policies. For example, all governments, banks, and social networks have their own management and service systems, which are called a management domain. With the rapid development of information technology, users' demand for data sharing is gradually increasing. Data sharing in a single domain can no longer meet the needs of users, and the data needed by a certain user may be in another management domain. For example, a WeChat user wants to share data with QQ users, and at the same time...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04L9/30
CPCH04W12/06H04W12/02H04L9/3066H04W12/03
Inventor 樊凯潘强白宇晗刘婷婷李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products