Book resource access control method based on ciphertext attribute authentication and threshold function

A resource access and control method technology, which is applied in the field of book resource access control based on ciphertext attribute authentication and threshold function, can solve the problems of reducing computing and communication overhead, easily revealing personal identity information, and high information sensitivity, so as to reduce computing and communication overhead, the effect of avoiding collusion attacks

Active Publication Date: 2020-03-24
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problem that in the identity authentication process of the existing information encryption access method, personal identity information is easily exposed, and the information sensitivity is high, and the access authority of the terminal members in the domain cannot be determined, the present invention proposes a method based on ciphertext attribute authentication and The book resource access control method of the th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Book resource access control method based on ciphertext attribute authentication and threshold function
  • Book resource access control method based on ciphertext attribute authentication and threshold function
  • Book resource access control method based on ciphertext attribute authentication and threshold function

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0062] Example 1

[0063] In the case of complex information sharing, the authentication center in the domain needs to authenticate the information sharing members, but when providing identity information, the identity information is easy to leak or be stolen. For security reasons, while sharing information with multiple parties, it is necessary to protect personal identity privacy. When information is shared, the confidentiality, integrity, and anti-leakage of communication information must also be guaranteed, and only authorized members can share information. In view of this application background, the present invention proposes a book resource access control method based on ciphertext attribute authentication and threshold function, such as figure 1 As shown, the steps are as follows: ①The terminal members participating in the sharing of information resources first perform parameter initialization, and generate their own public / private key pairs respectively; ②The terminal me...

Example Embodiment

[0089] Example 2

[0090] A method for access control of book resources based on ciphertext attribute authentication and threshold function, such as figure 1 As shown, in order to illustrate the content and implementation method of the present invention, a specific embodiment is given. In this embodiment, for the convenience of examples, the number of terminal members participating in information resource sharing is at most 10, and the entity set of terminal members is expressed as The set of corresponding entity terminal membership is expressed as The certification center CA defines the attribute set of all terminal members as Attr={A 1 ,A 2 }, terminal member u i The attribute set of (1≤i≤10) is attr i ={a i,1 ,a i,2 ,a i,3 }. The purpose of introducing details in this embodiment is not to limit the scope of the claims, but to help understand the implementation method of the present invention. Those skilled in the art should understand that various modifications, changes or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a book resource access control method based on ciphertext attribute authentication and a threshold function. The book resource access control method comprises the following steps that an authentication center and terminal members generate respective public/private key pairs; the terminal members interact with the authentication center to perform attribute authentication to obtain permission level values, and each terminal member sends the public key and the permission level value to the authentication center, and sends the public key and the permission level value to thecloud service platform after verification; the terminal member calculates an encryption key and a decryption key, encrypts the shared resource information into a ciphertext and uploads the ciphertextto the cloud service platform; and the terminal member determines a ciphertext resource to be checked according to the ciphertext, the cloud service platform verifies the identity of the ciphertext resource and opens an access link of the ciphertext resource, and the terminal member downloads the ciphertext for decryption. Personal privacy is protected by adopting a ciphertext attribute authentication technology, access permission is controlled by setting a threshold function to guarantee the safety of resource sharing, and collusion attack is prevented by adopting identity and permission dual authentication, so that information resource sharing in the Internet of Things is more flexible, efficient and practical.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a book resource access control method based on ciphertext attribute authentication and a threshold function. Background technique [0002] The development of the Internet of Things has led to the great development of data sharing and data interaction, making security and privacy more and more concerned by users. How to ensure the safe sharing of data, avoid the leakage of sensitive information, and protect the privacy of users is a severe challenge. Access control is an important guarantee to ensure the trust of the Internet of Things. The threshold function is set to divide access rights, and users with different rights can access information with different sensitivity levels, which avoids the leakage of sensitive information and realizes fine-grained, flexible and safe access to cloud server data. [0003] The library is a complex and numerous information library....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/30H04L29/08
CPCH04L9/3026H04L9/3066H04L63/0442H04L63/0876H04L63/102H04L63/105H04L67/1097
Inventor 江涛王锐芳李永娇袁俊岭李健勇甘勇张启坤
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products