Unlock instant, AI-driven research and patent intelligence for your innovation.

A Criterion-Based Access Control Method for Multiple Authorities

A technology for authorization and access control, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve the problems of excessive load and access policies of a single authority, and achieve improved flexibility, improved security, and improved security. Effect

Active Publication Date: 2022-07-15
HARBIN ENG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a kind of rule-based multi-authority organization access control method that solves the problem of excessive load of a single authority and flexible expression of access policies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Criterion-Based Access Control Method for Multiple Authorities
  • A Criterion-Based Access Control Method for Multiple Authorities
  • A Criterion-Based Access Control Method for Multiple Authorities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be further described below with reference to the accompanying drawings.

[0056] The invention relates to a criterion-based multi-authorization organization access control method, which belongs to the technical field of data encryption in network and information security. The purpose of the present invention is to provide a multi-authority criterion encryption method that supports weighting in order to solve the problems of overloaded single authority and flexible expression of access policies. This method uses criterion-based encryption. The encryption party can formulate an access policy according to its own needs, weight the criteria contained in it, and set a cumulative weight threshold. The visitor needs to satisfy both the policy and the weight threshold to successfully decrypt, which realizes a more attribute-based encryption. In terms of more flexible and fine-grained access control, this method supports multiple authorization agencies...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of data encryption in network and information security, and in particular relates to a criterion-based access control method for multiple authorization organizations. The invention solves the problem of excessive load of a single authority and flexible expression of access policies, adopts a rule-based encryption method, and expresses the rule in the form of a polynomial. When you have all the roots of the polynomial, you can reconstruct the polynomial for decryption, which realizes a more fine-grained access control mechanism than attribute-based encryption; at the same time, it supports the weighting of the criteria, which improves the flexibility of the access policy; in addition, multiple authorization agencies (t,n)-threshold secret sharing is performed between the two, so that there is no so-called performance bottleneck in the single authority mode in the system, and the security of the scheme is improved at the same time.

Description

technical field [0001] The invention belongs to the technical field of data encryption in network and information security, and in particular relates to a criterion-based access control method for multiple authorization organizations. Background technique [0002] In recent years, the rapid development of cloud computing technology has made it widely used and popularized. The cloud storage system provides many enterprises and individuals with convenient conditions for data storage and access without the constraints of time and space. The storage model also brings a certain degree of security threats, such as cloud service providers may be attacked by malicious attackers, resulting in unauthorized access, acquisition or damage of user data. Based on the above problems, in a cloud environment, users usually encrypt data before uploading it to the cloud. Therefore, a flexible and applicable access control mechanism is crucial for data privacy protection in a cloud environment. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/40H04L67/1097
CPCH04L9/0869H04L9/085H04L63/10H04L63/0442H04L67/1097
Inventor 刘泽超孙建国杨旸乔雨晴
Owner HARBIN ENG UNIV