Unlock instant, AI-driven research and patent intelligence for your innovation.

Unlimited revocable attribute-based encryption method

An attribute-based encryption, unlimited technology, used in user identity/authority verification, key distribution, and can solve problems such as being unable to cope with dynamic changes in user rights

Inactive Publication Date: 2022-02-25
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the drawbacks of the prior art, the present invention provides an efficient, safe and unrestricted revocable attribute-based encryption method, which solves the problem that the traditional attribute-based encryption method cannot cope with the dynamic change of user rights, and has the feature of unlimited and can Meet the dynamic needs of the addition of new roles, entities, attributes and policies in the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0014] Method of the present invention is made up of seven algorithms, and concrete construction process is as follows:

[0015] (1) System establishment Setup: input the security parameter λ, and construct a group with order q and a bilinear pair Let g, h be the group Generators of , and then obtain the bilinear pairing group Randomly choose a collision-resistant cryptographic hash function And a binary tree BT wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an unlimited revocable attribute-based encryption method. The method is characterized in that an encryption system has the characteristic of no limitation, a system initialization algorithm is irrelevant to an access strategy or the quantity of attributes in an attribute set, and a generated public parameter is a constant quantity of group elements, so that the dynamic requirements of addition of new roles, entities, attributes and strategies in the system are met. In order to achieve efficient user revocation, the cryptographic system revokes in a manner that a timestamp is embedded in a ciphertext, and each unrevoked user needs to receive an additional key update material associated with the timestamp generated by a trusted authorization mechanism to generate a complete decryption key. The method can be used for a cloud-assisted Internet of Things environment, confidentiality, integrity, expandability and access control services are provided for users in the cloud-based Internet of Things environment, and meanwhile effective user revocation is supported.

Description

technical field [0001] The present invention relates to the field of information security and communication, and specifically relates to an encryption method based on an unlimited revocable attribute. This method not only realizes fine-grained access control and ensures the confidentiality of data, but also realizes the user revocation function, and has Unlimited features, the system initialization algorithm has nothing to do with the access strategy or the number of attributes in the attribute set, and can adapt to the addition of new roles, entities, attributes and strategies in the system at any time, enhancing the security and usability of the system. Background technique [0002] In recent years, the application of the Internet of Things has been widely used in different fields such as e-medicine, smart factories, and smart cities to provide services such as intelligent identification, positioning, and supervision. However, as the number of smart devices grows, more res...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0891H04L9/3297
Inventor 黄鑫冯峻高克寒
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA