Outsourcing revocation method and system in attribute-based encryption system

An attribute-based encryption and system version technology, applied in the field of cryptography, can solve the problems of easy loss and theft, time-consuming, and a large amount of computing overhead, and achieve the effect of saving access overhead and overhead.

Inactive Publication Date: 2020-02-28
HUNAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, the data is processed by the attribute-based encryption method to generate attribute-based ciphertexts. Decrypting such ciphertexts requires a large amount of computational overhead, which is unaffordable for mobile devices with limited computing resources.
On the other hand, mobile devices are more likely to be lost and stolen than fixed devices. For lost or stolen devices, their access rights need to be revoked so that they can no longer access any data in the cloud
The revocation method in the current attribute-based encryption system usually requires the key generation center or the mobile user to perform a large number of revocation calculations, which is time-consuming and inefficient for both the key generation center and the mobile user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Outsourcing revocation method and system in attribute-based encryption system
  • Outsourcing revocation method and system in attribute-based encryption system
  • Outsourcing revocation method and system in attribute-based encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The specific embodiments of the present invention will be described in further detail below in conjunction with the drawings and embodiments. The following examples are used to illustrate the present invention, but not to limit the scope of the present invention.

[0030] The outsourcing revocation method and system in the attribute-based encryption system proposed by the present invention are mainly constructed based on the following existing mathematical and cryptographic knowledge.

[0031] (1) Bilinear pair

[0032] Define a function mapping e(.,.) to map elements in group G to group G T Go in, namely: e: G×G→G T ;

[0033] For a large prime number p, the properties satisfied by the bilinear pair are:

[0034] ①Bilinear characteristics: for g,h∈G, a,b∈Z p , There is e(g a ,h b )=e(g,h) ab Established, where Z p Represents the set {0,1,2,...,p-1};

[0035] ②Non-degeneration: there is at least one element g in the G group, so that the calculated e(g,g) is A generator of the g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an outsourcing revocation method and system in an attribute-based encryption system. The method comprises the following steps: generating a latest system version vector based ona public and private key pair of the attribute-based encryption system, and publishing a revocation user list; generating a latest user outsourcing key for the unrevoked user based on the latest system version vector; and based on the latest system version vector, updating the attribute-based encryption system ciphertext to generate a latest ciphertext. According to the invention, the calculationoperation required for user revocation in the attribute-based encryption system is outsourced to the third-party mechanism for execution, so that the key generation center only needs to execute a very small amount of calculation, and the terminal user does not need to execute any calculation, thereby greatly improving the user revocation efficiency in the attribute-based encryption system.

Description

[0001] 1. Technical Field [0002] The invention relates to an outsourcing cancellation method and system in an attribute-based encryption system, belonging to the field of cryptography in information security. [0003] 2. Background technology [0004] With the development of wireless communication technology and the popularization of mobile devices, more and more people begin to use mobile cloud computing services to process and store data. In a mobile cloud storage system, users can use their mobile devices (for example, mobile phones, tablet computers) to access data stored in the cloud anytime and anywhere. For example, users can store their photos, videos or other documents on mobile storage providers (such as Alibaba Cloud, iCloud) so that they can remotely access cloud data when necessary. [0005] When using a mobile cloud storage system, the main concern for users is whether the security and privacy of their own data can be guaranteed. An effective way to protect the securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0861H04L9/0869H04L9/0891H04L63/10
Inventor 邓桦秦拯欧露
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products