Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Offline/Online Lattice-Based Attribute-Based Encryption

An attribute-based encryption and encryption algorithm technology, applied in the field of encryption, can solve the problems of weak computing power of lightweight devices, achieve the effects of reducing computing and storage complexity, high parallelism, and resisting quantum attacks

Active Publication Date: 2022-04-01
HANGZHOU DIANZI UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] With the popularization of 5G networks, there are more and more scenarios of multi-user data sharing in 5G mobile networks. It is particularly important to use attribute-based encryption technology for fine-grained access to user decryption permissions. However, the increase in the transmission rate of 5G mobile networks does not mean that The encryption and decryption computing power of the mobile terminal itself will increase accordingly, and the computing power of lightweight devices is weak, and it is almost impossible to complete the complex calculation of encryption and decryption requests in a short time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Offline/Online Lattice-Based Attribute-Based Encryption
  • Offline/Online Lattice-Based Attribute-Based Encryption
  • Offline/Online Lattice-Based Attribute-Based Encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0076] The attacker L generates an access policy , and will Send to simulator M.

[0077] Simulator M receives Afterwards, the simulator M requests the oracle machine O, and obtains with .

[0078] for each , M requests the oracle machine O, and obtains .

[0079] for each , M requests the oracle machine O, and obtains , and then calculate .

[0080] for each , M requests the oracle machine O, and obtains , and then calculate .

[0081] Simulator M released . Keep not known.

[0082] Phase 1: Key query

[0083] Upon receiving a query with an attribute set S, if and , the simulator M outputs . Otherwise, for each , if S contains the attribute which is , M let ,otherwise . Then there must be a ,at this time Generated by TRAPGEN algorithm. Therefore M knows its Trapdoor, then the corresponding key can be calculated . L can make more than one query.

[0084] challenge

[0085] When the attacker L submits the message ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an offline / online lattice-based attribute-based encryption method. There are more and more scenarios of multi-user data sharing in 5G mobile networks. It is especially common to use attribute-based encryption technology to perform fine-grained access to user decryption permissions. Mobile devices have weak computing power and cannot complete encryption requests in a short time. Complicated calculations. Therefore, in order to improve the efficiency of encryption to apply to lightweight devices with weak computing power. The present invention performs preprocessing operations on key generation and encryption, which are divided into two stages: offline and online. In the key generation process, the offline phase does not need to know the attribute to generate the intermediate key, and the online phase generates the corresponding private key according to the attribute. During the encryption process, there is no need to know the message and access policy in the offline stage, and the complex calculations required for encryption are preprocessed. After the plaintext and access policy are known in the online stage, only a small amount of simple calculations are required to generate the ciphertext. Compared with the scheme based on LWE, the present invention has better computational performance.

Description

technical field [0001] The present invention relates to the technical field of encryption, and more specifically, to an off-line / on-line lattice-based attribute-based encryption method. Background technique [0002] Sahai and Waters extended the identity-based encryption scheme at the Omi Conference in 2005, and proposed an encryption scheme based on fuzzy identity, which can be regarded as ABE (ABE-Attribute Based Encryption), that is, attribute-based encryption scheme ([1 ] Amit Sahai, Brent Waters. Fuzzy Identity Based Encryption. Aarhus, Denmark: Springer Berlin Heidelberg, 457-473, 2004). In this scheme, the user identity is regarded as a series of attributes, and the user can decrypt the ciphertext if and only if the intersection of the user's key attribute set and the ciphertext attribute set is not less than the threshold set by the system. [0003] Since ABE is able to flexibly define access control policies, the ability to selectively share its encrypted data at a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06N10/60
CPCG06F21/602G06F21/604G06N10/00
Inventor 付兴兵王颖伦
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products