Unlock instant, AI-driven research and patent intelligence for your innovation.

A Hierarchical Optimal Encryption Lossless Privacy Protection Method

A privacy protection and key technology, applied in the field of access control technology and cryptography, it can solve the problems of limited application scenarios, key generation protection, slow encryption and decryption speed, etc., to improve execution efficiency, prevent tampering and forgery, and strengthen security. sexual effect

Active Publication Date: 2022-04-29
WUHAN UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Symmetric searchable encryption is based on symmetric encryption algorithm and pseudo-random function to encrypt data. It has high execution efficiency, fast encryption and decryption speed, and is suitable for encryption protection of large amounts of data. However, the applicable scenarios are limited, it is difficult to expand, and key generation protection is the key issue. where the
Asymmetric searchable encryption uses public and private key encryption algorithms to encrypt and protect data. The separation of public and private keys makes it more practical for multi-user models, but the algorithm is complex, the encryption and decryption speed is slow, and the calculation overhead is large. Obviously, execution efficiency, computing overhead, and performance load are the main problems of data encryption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Hierarchical Optimal Encryption Lossless Privacy Protection Method
  • A Hierarchical Optimal Encryption Lossless Privacy Protection Method
  • A Hierarchical Optimal Encryption Lossless Privacy Protection Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0034] A kind of hierarchical optimization encryption lossless privacy protection method provided by the present invention comprises the following steps:

[0035] Step 1: Based on the identity attribute set of the authorized user, the data manager uses a hash algorithm with a key to perform encryption preprocessing on the attribute set of each authorized user;

[0036] please see figure 1 , the specific implementation of step 1 in this embodiment includes the following sub-steps:

[0037] Step 1.1: start with {att 1 , att 2 ,..., att m |m=0, 1, 2, ..., M...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hierarchical optimization encryption lossless privacy protection method, which uses attribute-based encryption technology to construct a data security access control and multi-level key generation management mechanism to ensure the security of authorized user access credentials and the semantic information security of access control policies. Introduce random factors to confuse hidden data access patterns, optimize the execution of identity and authority verification of access control strategies, and improve mechanism execution efficiency and computing performance. Through the multi-level key generation management method, random factor parameters are introduced, based on symmetric searchable encryption technology, on the basis of ensuring data security, the problem of data availability after encryption is solved, combined with hybrid encryption technology to improve the retrieval of encrypted data Efficiency, and finally realize the data privacy protection method of hierarchical encryption, optimized performance, and non-destructive protection, which is suitable for the actual application scenarios of large data volume encryption and decryption, shared retrieval by multiple authorized users, and normal update of private data.

Description

technical field [0001] The invention belongs to the field of access control technology and cryptography technology, and relates to a hierarchical optimization encryption lossless privacy protection method, in particular to a hierarchical key generation and optimization based on attribute-based encryption technology to construct data access control and symmetrical searchable encryption A privacy-preserving method for losslessly encrypted data. Background technique [0002] Access control technology is an important mechanism to ensure data security and controllability. Complex and precise access control policies can be formulated according to actual environment requirements to protect user privacy and sensitive information such as authorized user access credentials, access session mechanisms, and access control policies, and prevent unauthorized users from Illegal access to data and unauthorized access to data by users with certain permissions. The access control mechanism ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06F21/45G06F7/58G06F16/22G06F16/24
CPCG06F21/602G06F21/604G06F21/6245G06F21/64G06F21/45G06F7/582G06F16/22G06F16/24
Inventor 牛晓光林青海徐远卓刘书洹
Owner WUHAN UNIV