Supercharge Your Innovation With Domain-Expert AI Agents!

Anonymous identity-based broadcast encryption method and system

A broadcast encryption and identity technology, applied in the field of cloud computing security, can solve the problem that the set of target receivers cannot decrypt the algorithm, etc.

Inactive Publication Date: 2020-08-25
FUJIAN NORMAL UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, in the anonymous PKBE scheme, the set of target recipients must not be used as the input of the decryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous identity-based broadcast encryption method and system
  • Anonymous identity-based broadcast encryption method and system
  • Anonymous identity-based broadcast encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. It should be noted that like numerals and letters denote similar items in the following figures, therefore, once an item is defined in one figure, it does not require further definition and explanation in subsequent figures.

[0035] Such as figure 1 As shown, the present invention discloses an anonymous identity-based broadcast encryption method, which specifically includes:

[0036] Step S1: Input the security parameter λ, and the algorithm outputs the system public parameters params and the system master key MK. The private key generation center PKG secretly holds the system master key MK and releases system public parameters params;

[0037] Step S2: In...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anonymous identity-based broadcast encryption method and system, and the method comprises the steps that a private key generator generates private keys based on the identities of all users for all users, and publishes system public parameters to a data owner and a data user at the same time; the data owner takes the authorized data user as a target receiver and applies the anonymous IBBE to encrypt a session key; an authorized data user in the target receiver set can successfully decrypt the broadcast ciphertext by using the private key of the authorized data user soas to obtain the session key; and finally, the authorized data user decrypts the encrypted data stored in the cloud storage server by using the session key to obtain the original plaintext data of the data owner. The system public parameters , the lengths of the private key and the ciphertext of the user and the decryption overhead are all fixed values, so that the efficiency of the anonymous public key broadcast encryption system is improved.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to an anonymous identity-based broadcast encryption method and system thereof. Background technique [0002] In most broadcast encryption application scenarios, anonymity is a very important security requirement. Anonymity means that the identity information of the target recipient cannot be disclosed to other recipients in the same group, let alone to non-target users outside the group. To achieve privacy protection, the identity information of the intended recipient needs to be kept secret during the broadcast session. However, in general PKBE (including IBBE) schemes, the identity information of the target receiver usually needs to be the default component of the final output broadcast ciphertext. In the decryption stage, each user must first verify whether it is an authorized receiver of this broadcast session according to the set of target receivers. Obvious...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0847H04L63/0421H04L63/0435
Inventor 李继国张亦辰陈礼青杨书略陈宇易鹏
Owner FUJIAN NORMAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More