Attribute encryption method, device, equipment and storage medium in cloud environment

An attribute encryption, cloud environment technology, applied in secure communication devices, digital transmission systems, electrical components, etc., can solve problems such as heavy workload, leakage of user data privacy, easy to be overwhelmed, etc., to improve efficiency and security, reduce The effect of computational overhead

Active Publication Date: 2022-05-31
PING AN TECH (SHENZHEN) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Cloud computing is the product of the development and fusion of traditional computer and network technologies such as distributed computing, parallel computing, utility computing, network storage, virtualization, and load-balancing content distribution network. Cloud services are the increase, use, and interaction of related services based on the Internet. However, as an open and distributed environment, the mobile cloud cannot guarantee the security of data, and cloud service providers will also rely on commercial interests For spying on user data, or even leaking user data privacy, cryptographic technology can be used to solve these mobile cloud security issues. Although traditional public key cryptography can achieve secure data sharing, it only supports one-to-one encryption and cannot To achieve flexible access control, attribute-based encryption is currently considered to be an effective technology for secure data sharing, allowing users to directly control data through access policies, and secure sharing of data can be achieved without the need for data owners to distribute keys to other users
[0003] In the existing schemes, the attribute-based encryption mechanism of a single authority is used, but for the single-authority mechanism, on the one hand, the user must go to a trusted central organization to verify the identity in order to obtain the key; on the other hand, a single authority needs to manage All user attributes and complex key distribution work, the workload is huge, and it is easy to be overwhelmed in a large-scale cloud environment, affecting system efficiency and security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute encryption method, device, equipment and storage medium in cloud environment
  • Attribute encryption method, device, equipment and storage medium in cloud environment
  • Attribute encryption method, device, equipment and storage medium in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The embodiments of the present invention provide an attribute encryption method, device, device and storage medium in a cloud environment, which are used for data encryption based on a multi-organization algorithm, which reduces the computational overhead of encryption and improves the efficiency and security of encryption.

[0029] The terms "first", "second", "third", "fourth", etc. (if present) in the description and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects and are not necessarily used to describe a specific order or sequence. It is to be understood that data so used can be interchanged under appropriate circumstances so that the embodiments described herein can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" or "having" and any variations thereof are intended to cover non-exclusive inclusion, for example, a process, method, system, product ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information security, and discloses an attribute encryption method, device, equipment and storage medium in a cloud environment, which are used for data encryption based on a multi-mechanism algorithm, which reduces the computational overhead of encryption and improves the efficiency and security of encryption sex. The attribute encryption method in the cloud environment includes: obtaining user privacy data; outputting global parameters, sending the global parameters to multiple authorities, so that each authority outputs a corresponding public key according to the global parameters; The password information generates the initial result, and sends the initial result to multiple authorities, so that each authority generates multiple random calculation results according to the initial result; randomly selects multiple basic random numbers, generates multiple intermediate ciphertexts, and generates multiple intermediate ciphertexts according to Multiple intermediate ciphertexts and preset ciphertext calculation formulas generate multiple target ciphertexts. In addition, the present invention also relates to block chain technology, and the target ciphertext can be stored in the block chain.

Description

technical field [0001] The present invention relates to the field of multiple encryption, and in particular, to an attribute encryption method, device, equipment and storage medium in a cloud environment. Background technique [0002] Cloud computing is the product of the development and integration of traditional computer and network technologies such as distributed computing, parallel computing, utility computing, network storage, virtualization, and load balancing content distribution networks, while cloud services are the increase, use and interaction of Internet-based related services. mode, usually involves the provision of dynamically scalable and often virtualized resources over the Internet. However, as an open distributed environment, mobile cloud cannot guarantee data security, and cloud service providers will also have commercial interests. To snoop on user data and even leak user data privacy, cryptographic technology can be used to solve the security problems o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0442H04L63/0478
Inventor 黄丽媛
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products