SM9-based attribute encryption method and system under large attribute set

An attribute encryption and attribute collection technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as low efficiency, many SM9 encryption and decryption times, and large attribute set implementations are not considered, to improve usability. , the effect of speeding up the decryption speed

Active Publication Date: 2021-05-11
GUIZHOU UNIV
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. The methods used in the two technical solutions only consider the case of a fixed attribute set, and do not consider the implementation under a large attribute set
[0007] 2. In the encryption and decryption method adopted by the first technical solution, the number of encryption and decryption using SM9 is too many, and the efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM9-based attribute encryption method and system under large attribute set
  • SM9-based attribute encryption method and system under large attribute set
  • SM9-based attribute encryption method and system under large attribute set

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Such as figure 1 As shown, this embodiment provides an SM9-based attribute encryption method under a large attribute set. In this embodiment, the encryption and decryption operations are performed when the attribute is dynamic, that is, a large attribute set. The attribute of the user is managed by the attribute authority. When the user sends a request to generate a private key to the key generation center, the attribute authority sends the corresponding attribute to the Key Generation Center. This embodiment includes: 1. System initialization. The key generation center initializes the system parameters to generate the master public key and the master private key. The attribute authority manages user attributes; The public key encrypts the plaintext message to generate the ciphertext; 3. During the decryption process, if the attributes of the data requester satisfy the access structure, the ciphertext can be decrypted to obtain the plaintext; otherwise, it cannot be de...

Embodiment 2

[0080] This embodiment provides a SM9-based attribute encryption system under a large attribute set, including:

[0081] The key generation center is used to initialize the obtained system parameters by calling the SM9 algorithm to generate a master public key and a master private key; the master public key is open to all legitimate users, and the master private key is generated by the key Center is kept privately.

[0082] The data owner is used to determine the first access structure.

[0083] The attribute authority is used to generate a first attribute set according to the first access structure sent by the data owner; the attribute authority is used to manage and update stored user attributes; the attribute authority includes multiple attribute sets.

[0084] The data owner is also used to convert the first attribute set sent by the attribute authority into an identity set by calling the access structure identity conversion algorithm, and encrypt the first plaintext acco...

Embodiment 3

[0088] Such as figure 2 and 3 As shown, this embodiment provides an SM9-based attribute encryption method under a large attribute set, including the following steps.

[0089] Step S1, system parameter initialization, the key generation center initializes the system parameters by calling the SM9 algorithm, and generates the master public key M pk and master private key M sk . The attribute authority is responsible for the management of user attributes to ensure the update and security of user attributes.

[0090] Further, in the step S1, the following steps are included:

[0091] Step S11, the key generation center calls the initialization algorithm of SM9, and passes in the initial system parameter k, through (M pk , M sk )←SM9.Setup(1 k ), get the master public key M pk and master private key M sk , master public key M pk Public within the system, namely the master public key M pk Shared with all legal users, the master private key M sk Then it is kept secretly b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SM9-based attribute encryption method and system under a large attribute set, and relates to the technical field of information encryption, and the method comprises the steps that a key generation center generates a main public key and a main private key; the data owner determines a first access structure; the attribute authority generates a first attribute set according to the first access structure; the data owner calls an access structure identity conversion algorithm to convert the first attribute set into an identity set, and encrypts the first plaintext according to the identity set and the main public key to generate a first ciphertext; the data requester obtains a second ciphertext needing to be decrypted at the current stage; and the key generation center judges whether the second ciphertext exists or not, and if yes, the second ciphertext is decrypted according to the user identity of the data requester and the decryption key and the hash value under the second attribute set. According to the invention, the flexibility, the dynamism and the high efficiency of one-to-many data sharing are ensured in a cloud environment.

Description

technical field [0001] The invention relates to the technical field of information encryption, in particular to an SM9-based attribute encryption method and system under a large attribute set. Background technique [0002] With the development of cloud computing technology, more and more data is stored on the cloud, which puts forward higher requirements for the security of data on the cloud. Generally, attribute encryption is adopted to ensure the security of data storage and sharing on the cloud, and since the attributes of the users involved in access control in the cloud scenario cannot be completely determined during the system initialization phase, there is no need to set the attribute set used in advance. Attribute encryption under attribute set has a better application prospect in cloud environment. [0003] SM9 is an identity-based encryption algorithm issued by the State Cryptography Administration (see "GM / T0044-2016 SM9 Identification Cryptography Algorithm" sta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3236
Inventor 彭长根高文涛丁红发田有亮刘荣飞
Owner GUIZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products