Unlock instant, AI-driven research and patent intelligence for your innovation.

CP-ABE method for supporting mobile equipment under hybrid cloud based on multiple authorizations

A CP-ABE and mobile device technology, applied in the field of CP-ABE based on multi-authorization, can solve problems such as unbearable calculation and communication overhead, and achieve the effects of reducing burden, improving decryption efficiency, and increasing security

Active Publication Date: 2021-01-22
ZHEJIANG GONGSHANG UNIVERSITY
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, most of the current multi-authorization CP-ABE schemes have unbearable computational and communication overheads for mobile devices with limited resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CP-ABE method for supporting mobile equipment under hybrid cloud based on multiple authorizations
  • CP-ABE method for supporting mobile equipment under hybrid cloud based on multiple authorizations
  • CP-ABE method for supporting mobile equipment under hybrid cloud based on multiple authorizations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0035] The multi-authorization-based CP-ABE method supporting mobile devices under the hybrid cloud includes the following steps:

[0036] Step 1. The system is established and initialized, and the key generation center generates the public-private key pair of the system.

[0037] The system includes users with mobile devices, data owners, private cloud, public cloud, user assistant (CUA) and a series of attribute authority (AA) in CUA.

[0038] Initialization, input two security parameters α, β and a cyclic group G of prime number order 0 , output system public key PK and master key MK.

[0039] G 0 Is a cyclic group of prime order p, g is the generator, bili...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-authorization-based CPABE method for supporting mobile equipment under hybrid cloud, which comprises the following steps: S1, initializing and generating a system public and private key pair of a system public key and a master key; S2, an encryption stage: uploading the authorized user list to a private cloud, encrypting data in combination with a system public keyunder an access strategy to obtain a ciphertext, and uploading the ciphertext to a public cloud; S3, a secret key generation stage: taking a system public key, a master secret key and a random numberselected from the authorization attribute set as screening secret keys, calculating to obtain a user secret key, and calculating an attribute authorization secret key through the system public key, the user attribute set and the screening secret key; and S4, a decryption stage: carrying out CUA decryption by using the user key, the attribute authorization key, the system public key and the ciphertext containing the access strategy as inputs, outputting a semi-decrypted ciphertext, carrying out user decryption by using the semi-decrypted ciphertext, the system public key and the attribute authorization key as inputs, and outputting data.

Description

technical field [0001] The invention relates to the technical field of multi-authorization CP-ABE, in particular to a multi-authorization-based CP-ABE method supporting mobile devices under a hybrid cloud. Background technique [0002] CP-ABE (ciphertext policy attribute based encryption, ciphertext policy attribute based encryption system) means that the ciphertext corresponds to an access structure and the key corresponds to the attribute set, decryption if and only if the attributes in the attribute set can satisfy the access structure . This design is relatively close to the actual application scenario. It can be assumed that each user obtains the key from the attribute organization according to its own conditions or attributes, and then the encryptor formulates the access control to the message. [0003] However, most current multi-authorization CP-ABE schemes have unbearable computational and communication overheads for mobile devices with limited resources. Content...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L29/06
CPCH04L9/3073H04L63/10H04L9/0861Y02D30/70
Inventor 阮莹莹谢满德洪海波
Owner ZHEJIANG GONGSHANG UNIVERSITY