Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Efficient responsibility-traceable and revocable attribute-based encryption method

An attribute-based encryption and efficient technology, applied in the field of information security and privacy protection, can solve problems such as no storage overhead

Inactive Publication Date: 2021-08-31
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 4) This scheme has no storage overhead for traceability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient responsibility-traceable and revocable attribute-based encryption method
  • Efficient responsibility-traceable and revocable attribute-based encryption method
  • Efficient responsibility-traceable and revocable attribute-based encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Specific embodiments of the present invention are described below, so that those skilled in the art understand the present invention, but, the present invention is not limited to the scope of specific embodiments, for those of ordinary skill in the art, as long as various changes Within the scope of the present invention defined and determined by the claims, all inventions and creations utilizing the concept of the present invention are included in the protection.

[0044] Our scheme consists of eight phases: system initialization phase, key generation phase, encryption phase, decryption phase, key integrity verification, traitor tracing phase, user revocation phase, and public audit phase.

[0045] 1) System initialization (System Initialization contains two algorithms)

[0046] There is one entity participating in this stage, the system authority AT, the system authority executes the system establishment algorithm, and is responsible for generating the public paramete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The innovation points of the scheme are as follows: 1) the problem of key abuse in the existing CP-ABE-based PHR system is solved; 2) public auditing is used to judge whether the user is criminal or not; if the traced user claims that the user is crime-free, an auditor is provided to execute an auditing algorithm to make a fair decision so as to decide whether the user is crime or not; 3) the Chinese remainder theorem is adopted to realize user revocation, for traitor users in the system or users exiting the system, all permissions of the traitor users in the system need to be revoked so as to ensure the safety of medical record data of patients; once the user is revoked, the user cannot access any information in the PHR system, and the system authority of the user which is not revoked is not influenced; and 4) the scheme has no storage overhead for tracing. Paillier-style encryption is used as the basis of user tracing, so that a system does not need to maintain a user identity table for tracing, and storage for tracing is realized.

Description

technical field [0001] The invention relates to the fields of information security and privacy protection, in particular to an efficient attribute-based encryption method that is accountable and revocable. The method can not only realize the accountability of malicious users but also support user revocation. In addition, this method outsources part of the decryption operation, which improves the efficiency of the system. Background technique [0002] PHR (Personal health records) personal health record platform is created and maintained by an individual patient or medical consumer based on his / her understanding of his / her own health conditions, medications, laboratory tests, diagnostic studies, problems, allergies, vaccinations, etc. of. It can store, organize, manage, share, and track personal health information from various channels in one place. Doctors can use the PHR platform to access patient data online at any time and any place. This can not only improve the docto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06H04L29/08G16H10/60
CPCH04L9/0891H04L63/0442H04L67/12H04L67/10G16H10/60H04L2463/146
Inventor 吴怡张维秦志光
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products