Multi-authorization access control system and method based on attribute encryption

A technology of authorized access and attribute encryption, which is applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as security loopholes, security risks, and single authorization center mode, and achieve the effect of improving encryption

Inactive Publication Date: 2020-02-21
ZHEJIANG UNIV OF TECH
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the role-based access control method cannot encrypt data information and can only perform security control on information access, and does not manage fine-grained information itself, so there are potential security risks; the invention CN103220291A proposes a The basic implementation of the attribute-based control system, the invention combines the ABAC access strategy of the ciphertext strategy with the XACML language, and initially realizes the access control system based on attribute encryption, but the invention only focuses on the single authorization center mode, and adopts The traditional NAND gate model is used to construct the access decision tree, and there are problems such as encryption, decryption time-consuming, and security loopholes.
Invention CN106790119A proposes an attribute-based access control method that supports attribute revocation and granting. On the basis of realizing basic attribute-based access control, it realizes support for user attribute granting and revocation, and improves the flexibility of the system. However, the system The encryption and decryption efficiency is still very low and the security attack against user collusion cannot be well prevented

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-authorization access control system and method based on attribute encryption
  • Multi-authorization access control system and method based on attribute encryption
  • Multi-authorization access control system and method based on attribute encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0031] Example: such as figure 1 As shown, a multi-authorization access control system based on attribute encryption includes: authorization center, attribute authorization center, data owner, data storage server, and access user; wherein, the authorization center: represented as CA (CenterAuthority), is responsible for setting the system Parameters to generate public key PK and master key MK;

[0032] Attribute authorization center: represented as AA (Attribute Authority), responsible for generating private keys for the attributes it is responsible for;

[0033] Data owner: represented as DO (Data Owner), responsible for expressing the policy set of data access and encrypting data;

[0034] Data cloud storage service: denoted as DSM (Data System Manager), responsible for storing the data ciphertext encrypted according to the access policy customized by the policy customizer, and providing decryption services for users;

[0035] Access user: denoted as User, each user has an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a multi-authorization access control system and method based on attribute encryption, and the system and method employ an LSSS linear secret sharing model to replace an NAND gate model of shamir, and effectively improve the encryption and decryption efficiency of information. According to the method and the system, a secret key generation mode of multiple authorization centers is realized, a user collusion attack mode can be well defended, ciphertext encryption of data information is realized in DO, and the purpose of performing data encryption on the data informationis achieved. In each AA, an attribute set which is more owned by each independent user is generated to generate an independent corresponding secret key, and fine grit management of user permission control is realized.

Description

technical field [0001] The invention relates to the field of information encryption and decryption of network information security, in particular to a multi-authorization access control system and method based on attribute encryption. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: access control means that only users who have passed the authentication of the server can access relevant data. At present, cloud storage has attracted most users because of its convenience, low price, and ability to handle complex calculations. Or the company puts personal data or projects in the cloud environment, and as the amount of data continues to increase, the security of the data in the cloud server has also attracted attention. Therefore, the concept of encrypted access control system has been introduced. Among the existing encryption access control models, ABE is the most prominent. It is mainly divided into CP-ABE and KP...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/085H04L9/0869H04L63/10H04L63/20
Inventor 郑河荣冷云骁
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products