Partial strategy hiding access control method and system and wireless communication system

An access control and access control strategy technology, applied to key distribution, can solve the problems of increased user computing burden, low user authentication efficiency, and low authentication efficiency

Active Publication Date: 2020-09-22
XIDIAN UNIV
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004]However, the existing policy-hidden CP-ABE access control scheme still does not fully solve how to improve the efficiency of user authentication and the safe and efficient user revocation and attribute revocation; (1) The authentication phase and the decryption phase are independent of each other, which makes authorized users perform repeated calculations, resulting in an increase in the user's computing burden. How to improve computing efficiency is a technical problem
(2) In the user authentication stage, due to the use of a large number of bilinear pairing operations, the authentication efficiency is low. How to improve the authentication efficiency is a technical problem
(3) The existing user revocation and attribute revocation schemes do not involve policy hiding scenarios. How to perform safe and efficient revocation under the policy hiding situation is a technical problem
[0006](1) The authentication phase and the decryption phase are independent of each other, which makes authorized users perform repeated calculations and increases the user's computing burden. How to improve computing efficiency is a technical problem
[0007](2) In the user authentication stage, due to the use of a large number of bilinear pairing operations, the authentication efficiency is low. How to use cloud service providers with abundant computing resources It is a technical problem to complete part of the certification
[0008](3) Existing user revocation and attribute revocation schemes do not involve the scenario of policy hiding. How to perform safe and efficient revocation under the condition of policy hiding is a technical problem
[0009] Difficulties in solving the above problems and defects are as follows: (1) The technical difficulty of fast authentication mainly lies in the fact that the authentication stage and the decryption stage are independent of each other, which is difficult to achieve with fast authentication technology an important reason
(2) How to perform user revocation and attribute revocation in the case of policy hiding is also an important reason why revocation cannot be used safely and efficiently
(3) Due to the use of bilinear pairing in the user authentication process, the efficiency of user authentication is extremely low, which is an important reason why it is difficult to authenticate efficiently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Partial strategy hiding access control method and system and wireless communication system
  • Partial strategy hiding access control method and system and wireless communication system
  • Partial strategy hiding access control method and system and wireless communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0082] Aiming at the problems existing in the prior art, the present invention provides a method, system, and wireless communication system for partial policy concealment access control. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0083] Such as figure 1 As shown, the partial policy concealment access control method provided by the present invention includes the following steps:

[0084]S101: global initialization: the global certification center CA selects system security parameters, generates global public parameters and system master keys; at the same time, as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of wireless communication, and discloses a partial strategy hiding access control method and system and a wireless communication system. A central authorization center generates global public parameters, a system master key and a user global unique identity identifier; the attribute authorization center generates an attribute authorization center publicand private key pair, and generates a user agent key and a decryption key; the data owner formulates an access control strategy according to a sharing demand, embeds the access control strategy intothe ciphertext, and uploads the partially hidden access control strategy and the ciphertext to the cloud together; the cloud service provider judges whether the data requester meets the partially hidden access control strategy or not; the data user uses the decryption key to complete final authentication; when user revocation occurs, the cloud service provider deletes the proxy key corresponding to the revoked user; and when attribute revocation occurs, the cloud service provider updates the corresponding proxy key and ciphertext. According to the invention, the authentication efficiency is high under the same security strength.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and in particular relates to a partial policy concealment access control method, system and wireless communication system. Background technique [0002] At present, in the traditional CP-ABE access control scheme, the access control policy is an access structure, which is represented by the attribute of the authorized person, clearly stipulates the user group with data access rights, and is in the form of plain text together with the cipher text Upload to the cloud. Any user who obtains the ciphertext can know the relevant access control policy, but the access control policy usually contains certain sensitive information, which may leak user privacy. For example, in a medical cloud scenario, a hospital that manages electronic medical records on behalf of patients stores data on the cloud, and patients or medical staff can access the cloud to obtain data. In order to achieve acces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/60G06F21/62H04L9/08H04L29/06
CPCG06F21/31G06F21/602G06F21/6245H04L9/0861H04L63/08H04L63/10H04L63/0435
Inventor 樊凯张明润潘强白宇晗李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products