Unlock instant, AI-driven research and patent intelligence for your innovation.

Hierarchical optimization encryption lossless privacy protection method

A privacy protection and key technology, applied in the field of access control technology and cryptography, can solve the problems of slow encryption and decryption, limited application scenarios, key generation protection, etc., to strengthen security, improve execution efficiency, prevent tampering and fake effect

Active Publication Date: 2021-06-18
WUHAN UNIV
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Symmetric searchable encryption is based on symmetric encryption algorithm and pseudo-random function to encrypt data. It has high execution efficiency, fast encryption and decryption speed, and is suitable for encryption protection of large amounts of data. However, the applicable scenarios are limited, it is difficult to expand, and key generation protection is the key issue. where the
Asymmetric searchable encryption uses public and private key encryption algorithms to encrypt and protect data. The separation of public and private keys makes it more practical for multi-user models, but the algorithm is complex, the encryption and decryption speed is slow, and the calculation overhead is large. Obviously, execution efficiency, computing overhead, and performance load are the main problems of data encryption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hierarchical optimization encryption lossless privacy protection method
  • Hierarchical optimization encryption lossless privacy protection method
  • Hierarchical optimization encryption lossless privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to facilitate the understanding of the present invention, the present invention will be understood in connection with the accompanying drawings and examples, and the embodiments described herein are intended to illustrate and explain the present invention. this invention.

[0034] One classification optimized encrypted lossless privacy protection method provided by the present invention includes the following steps:

[0035] Step 1: The data manager is based on the identity property of the authorized user, encrypts the attribute set of each authorized user with a key-based hash algorithm;

[0036] Please see figure 1 The specific implementation of the step 1 of the present embodiment includes the following sub steps:

[0037] Step 1.1: {Att 1 ATT 2 , ..., ATT m | m = 0, 1, 2, ..., m} indicates an authorized user U i M individual sets, existing N authorized users consisting with {u n }, Indicating that two linear group g 1 , Double linear mapping E: g 1 × g 1 → g 2 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hierarchical optimization encryption lossless privacy protection method, which is characterized in that a data security access control and multi-level key generation management mechanism is constructed based on an attribute-based encryption technology, so as to ensure the access credential security of an authorized user and the semantic information security of an access control strategy; random factors are introduced to obfuscate a hidden data access mode, the verification execution of the identity and authority of the access control strategy is optimally designed, and the mechanism execution efficiency and the calculation performance are improved. Through a multi-level key generation management method and introduction of random factor parameters, the availability problem of encrypted data is solved on the basis of ensuring data security based on a symmetric searchable encryption technology, and the high efficiency of encrypted data retrieval is improved in combination with a hybrid encryption technology; and finally, the data privacy protection method with hierarchical encryption, performance optimization and lossless protection is realized; the invention is suitable for actual application scenes of large-data-volume encryption and decryption, multi-authorized-user shared retrieval and privacy data normal update.

Description

Technical field [0001] The present invention belongs to the field of access control technology and cryptography, involving a hierarchical optimization encryption lossless privacy method, and specifically, a hierarchical key generation and optimization of a combination of attribute-based encryption technologically based information access control and symmetric searched encryption. Privacy protection method for non-destructive encrypted data. Background technique [0002] Access control technology is an important mechanism for ensuring data security, which can develop complex and accurate access control policies based on actual environmental requirements to protect authorized users access credentials, access session mechanisms, access control policies and other user privacy sensitive information, prevent unauthorized users Improved access data of illegal access to data and a certain permissions user. Based on the access control mechanism of Zero-Knowledge Proofprotocol, the externa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06F21/45G06F7/58G06F16/22G06F16/24
CPCG06F21/602G06F21/604G06F21/6245G06F21/64G06F21/45G06F7/582G06F16/22G06F16/24
Inventor 牛晓光林青海徐远卓刘书洹
Owner WUHAN UNIV