Multi-center revocable key strategy attribute-based encryption method and device and storage medium

An attribute-based encryption and multi-center technology, applied in the field of data security, can solve problems such as fixed number of users, single point of failure, and lack of flexibility in key management

Active Publication Date: 2021-04-16
SOUTH CHINA AGRI UNIV
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, when the current key policy attribute-based encryption algorithm realizes the reversible function, most of the schemes have problems such as the fixed number of users, the undo operation affecting too many users, a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-center revocable key strategy attribute-based encryption method and device and storage medium
  • Multi-center revocable key strategy attribute-based encryption method and device and storage medium
  • Multi-center revocable key strategy attribute-based encryption method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0106] Such as figure 1 As shown, this embodiment provides a multi-center revocable key policy attribute-based encryption method, which includes the following steps:

[0107] S101. Generate system global parameters.

[0108] Specifically, let G and G T is a bilinear group with prime order p, and e is a bilinear map e: G×G→G T , g is the generator, after determining the security parameter δ, input the security parameter δ to generate the global parameters of the system: sp=(G, G T , e, g, p), complete the initialization of the system.

[0109] S102. Determine the number of attribute authorities and the attribute set of each attribute authority.

[0110]In this embodiment, the number of attribute authorization organizations is N. Under the premise of a given attribute space u, each attribute authorization organization manages mutually disjoint attribute sets. Generate any interaction to complete initialization of the property authority.

[0111] S103. Send the system globa...

Embodiment 2

[0172] Such as Figure 8 As shown, this embodiment provides a multi-center revocable key policy attribute-based encryption device, which includes a generation module 801, a determination module 802, a first sending module 803, a second sending module 804, and a third sending module 805 and the fourth sending module 806, the specific functions of each module are as follows:

[0173] The generating module 801 is configured to generate system global parameters.

[0174] A determining module 802, configured to determine the number of attribute authorities and the attribute set of each attribute authority.

[0175] The first sending module 803 is used to send the system global parameters to each attribute authority, so that each attribute authority generates the public-private key pair of the attribute authority according to the system global parameters, including public key, private key and user Key revocation parameters.

[0176] The second sending module 804 is used to send t...

Embodiment 3

[0186] This embodiment provides a computer device, which can be a computer, such as Figure 9 As shown, a processor 902, a memory, an input device 903, a display 904 and a network interface 905 are connected through a system bus 901, the processor is used to provide computing and control capabilities, and the memory includes a non-volatile storage medium 906 and an internal memory 907, the non-volatile storage medium 906 stores an operating system, a computer program, and a database, the internal memory 907 provides an environment for the operation of the operating system and the computer program in the non-volatile storage medium, and the processor 902 executes the During the computer program, realize the multi-center revocable key policy attribute-based encryption method of the above-mentioned embodiment 1, as follows:

[0187] Generate system global parameters;

[0188] Determine the number of attribute authorities and the set of attributes for each attribute authority;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-center revocable key strategy attribute-based encryption method and device, and a storage medium, and the method comprises the steps: each attribute authorization mechanism generating a public and private key pair of the attribute authorization mechanism, and the public and private key pair comprising a public key, a private key and a user key revocation parameter; the encipher inputting a plaintext message, an attribute set corresponding to the plaintext message, a system global parameter and a public key of an attribute authorization mechanism corresponding to the attribute set to obtain a ciphertext message; each attribute authorization mechanism updating a user key revocation parameter in the public and private key pair and obtaining a partial decryption key of the decryptor to form a decryption key of the decryptor; and the decryptor inputting the global ID of the decryptor, the decryption key, the access strategy and the public key and ciphertext message of the attribute authorization mechanism of which the attribute set satisfies the access strategy to obtain a plaintext message. According to the method and the device, interaction between mechanisms is not needed during key management, and participation of other users is not needed, so that the security is improved, and the flexibility is also improved.

Description

technical field [0001] The invention relates to a multi-center revocable key policy attribute-based encryption method, device and storage medium, belonging to the field of data security. Background technique [0002] The attribute-based encryption algorithm first appeared in the scheme of Sahai and Waters. In order to improve the fault-tolerant performance of the encryption system based on biological information, they first proposed a scheme based on fuzzy identity encryption in 2005, using biological characteristics directly as identity information in the In identity-based encryption schemes. Sahai introduced the concept of attributes in his paper, and decomposed the user identity into a series of attributes describing the user identity. The encryptor specifies an attribute set and threshold d when encrypting data, and the decryptor must have at least d given attributes to be correct. Decrypt the ciphertext. [0003] In 2006, Goyal et al. proposed the concept of KP-ABE fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
Inventor 肖媚燕黄琼苗莹刘文博
Owner SOUTH CHINA AGRI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products