A layered file encryption method and system

A file encryption and file technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as user unauthorized access and collaborative attacks, and achieve the effect of solving unauthorized access and collaborative attacks

Active Publication Date: 2022-04-08
SICHUAN NORMAL UNIV
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is that the existing file-layered CP-ABE scheme has security issues of user unauthorized access and cooperative attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A layered file encryption method and system
  • A layered file encryption method and system
  • A layered file encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] A layered file encryption method provided by the present invention is applied in such as figure 1 In the encryption system shown. This layered file encryption method includes:

[0067] According to the layered files to be encrypted and the hierarchical relationship of each layered file to be encrypted, a one-way door access tree is constructed; based on the one-way door access tree Treat the encrypted layered file ck through the system public key PK i Encrypt, obtain the encrypted ciphertext and send it to the cloud service provider for storage.

[0068] When all attributes of the data consumer attribute set satisfy part or all of the one-way door access tree, the encrypted ciphertext is decrypted by the system public key and the data consumer private key to obtain the decrypted plaintext, otherwise the decryption fails.

[0069] Wherein, the data consumer attribute set S includes but not limited to the user's occupation, title and affiliation.

[0070] Further, as ...

Embodiment 2

[0113] Such as figure 1 As shown, the present invention provides a layered file encryption system including an authority, a data owner, a cloud service provider, and a data consumer.

[0114] The authority (CA) is used to calculate and obtain the system public key PK and system master key MSK through the system initialization parameter λ, and obtain the data consumer identity information and the corresponding data consumer attribute set S from the data consumer; based on the system The public key PK, the system master key MSK and the data consumer attribute set S calculate the data consumer private key SK; send the system public key PK to the data owner, and send the corresponding data consumer private key according to the identity information of the data consumer The key SK is sent to the corresponding data consumer.

[0115] The data owner (CSP), used to obtain the system public key PK from the authority, and layer the file ck according to the encryption i Construct a one-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a layered file encryption method and system. The method constructs a one-way gate access tree by introducing a control attribute and a one-way gate, and on this basis, constructs a key sub-item and a ciphertext sub-item of the control attribute, And reconstruct the ciphertext sub-item of the transmission node, so as to solve the problem of unauthorized access and cooperative attack, and realize the security encryption of multi-level files.

Description

technical field [0001] The invention relates to the technical field of shared data encryption, in particular to a layered file encryption method and system. Background technique [0002] In recent years, with the rapid development of the Internet, the scale of data has become larger and larger. The cloud environment has become one of the most promising application platforms to solve data sharing problems because it can provide both computing services and storage services. In a cloud environment, in order to ensure that data is not obtained and destroyed by other users or malicious servers, users need to encrypt data before sharing it. Attribute-based encryption (ABE) has attracted extensive attention due to its ability to protect data privacy and achieve fine-grained, one-to-many, and non-interactive access control. Ciphertext Policy-Based Attribute Encryption (CP-ABE) scheme has greater flexibility and applicability, so it is a more feasible scheme. [0003] However, in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F21/60
CPCH04L63/0428H04L63/0435G06F21/602
Inventor 冯朝胜刘帅南
Owner SICHUAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products