CP-ABE method for supporting privacy protection and decryption in cloud

A CP-ABE, privacy protection technology, applied in the field of CP-ABE, can solve the problems of inflexible access structure, increased computing consumption, low computing efficiency, etc., to improve the application scope and practicability, reduce storage overhead, prevent false the effect of the result

Pending Publication Date: 2021-11-09
XIDIAN UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since Nishide et al. first proposed the CP-ABE scheme of the hidden strategy in 2008, a large number of schemes have been proposed by other researchers. However, if these schemes are used in the actual system, they basically face three problems: ( 1) Low computational efficiency
Due to the large number of pairing operations and exponential operations involved in ABE, the calculation consumption of the user in the decryption phase increases linearly with the number of attributes
(2) The access structure is not flexible
Through our previous research, we found that although many existing solutions claim to protect user privacy, a lightweight DDH test algorithm can expose the access policy or the attributes that constitute the policy, resulting in privacy leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CP-ABE method for supporting privacy protection and decryption in cloud
  • CP-ABE method for supporting privacy protection and decryption in cloud
  • CP-ABE method for supporting privacy protection and decryption in cloud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Next, the related art in the embodiments of the present invention will be described in the following examples, which will be apparent from the embodiments of the present invention, and not all of the embodiments of the present invention, not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art are in the range of the present invention without making creative labor premise.

[0057] refer to Figure 1 ~ 3 A CP-ABE method that supports privacy protection and decryption in a cloud, including the following steps:

[0058] Step 1, system initialization and system parameter settings;

[0059] Step 2, generate a data user private key; the user private key attribute is divided into attribute name and attribute value, which will be embedded in ciphertext to protect sensitive attribute information;

[0060] Step three, encrypt the plain text message; set the policy tag in the encrypted text message to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of cloud storage security and information security, and relates to a CP-ABE method for supporting privacy protection and decryption in cloud. According to the invention, a CP-ABE scheme with functions of user privacy protection, decryption test, decryption outsourcing and message verifiability is realized. According to the method, a flexible LSSS structure construction scheme is used in a prime order group; attributes are divided into attribute names and attribute values, the attribute values containing sensitive information are embedded into a ciphertext, and meanwhile multiple groups of generators and random values are selected to achieve anonymity of data users; a decryption test algorithm and an outsourcing decryption algorithm are added, so that the calculation overhead of a data user is saved, and a large amount of decryption calculation is handed over to a third party; and a message verifiability algorithm ensures the decryption accuracy. According to the scheme of the invention, the decryption efficiency, the ciphertext storage overhead and the access control flexibility are greatly improved on the basis of privacy protection, and the problems of privacy disclosure, high user calculation cost and the like in the prior art are solved.

Description

Technical field [0001] The present invention is in the field of security technology cloud storage and information security, particularly, to a privacy and support cloud decrypted CP-ABE method. Background technique [0002] With the maturing of cloud computing and 5G technologies, cloud-based data storage and sharing platform has become an inevitable trend. However, as a credible cloud platform, to ensure that users upload data can be securely stored and shared, it is necessary to encrypt the data, but the share of traditional encryption obvious drawbacks: First, the traditional need to use third-party data sharing technology ; the owner of the other, the data can not be arbitrarily define access object data, access control is not flexible enough. For example, the number of identity-based encryption (Identity-Based Encryption, IBE), and the only guarantee receiving user data between "one to one" approach, the computational overhead and the length of the ciphertext decryption and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/78
CPCG06F21/602G06F21/6245G06F21/78
Inventor 张乐友胡功成
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products