Unlock instant, AI-driven research and patent intelligence for your innovation.

Universal black box traceable method and device for attribute-based proxy re-encryption system

A proxy re-encryption and re-encryption technology, applied in the field of information security and privacy protection, can solve problems such as hindering the application and development of encryption primitives, and AB-PRE system security threats, so as to resist the risk of key leakage and prevent it from being destroyed again. Effect

Pending Publication Date: 2022-06-03
NANJING UNIV
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] As mentioned above, the key abuse problem has caused a great security threat to the AB-PRE system, and it has also seriously hindered the application and development of this encryption primitive in practical scenarios. Key Tracking Scheme of PRE System

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Universal black box traceable method and device for attribute-based proxy re-encryption system
  • Universal black box traceable method and device for attribute-based proxy re-encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be further explained below in conjunction with specific embodiments. It should be understood that these embodiments are only used to illustrate the present invention and not to limit the scope of the present invention. The modifications all fall within the scope defined by the appended claims of this application.

[0057] A general black-box traceability method for an attribute-based proxy re-encryption system, including system initialization, key generation, re-encryption key generation, encryption, re-encryption, decryption, re-decryption and traceability are implemented in eight parts. The system implementation process is as follows figure 1 shown. combine figure 1 , the method is described as follows:

[0058] System initialization is the generation of system public parameters by the attribute authority AA, including the system master public key and master private key, and tracking related parameters;

[0059] The key generation is tha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a universal black box traceable method and device for an attribute-based proxy re-encryption system, and the method comprises the steps: carrying out the initialization processing, and generating system public parameters; the attribute authority generates an attribute key embedded with a fingerprint code for the authorized user; the authorized user generates a re-encryption key embedded with the fingerprint code for the authorized user; the data owner executes an encryption operation and uploads a ciphertext to the cloud; when the authorized user has a data access demand, the cloud performs ciphertext conversion according to the corresponding re-encryption key and sends the ciphertext to the authorized user; the authorized user can decrypt the encrypted ciphertext; the authorized user can decrypt the re-encrypted ciphertext; when a decryption device other than the system authorization appears on the market, the attribute authorizes the execution of the tracking operation. According to the method, ciphertext strategy attribute-based encryption is combined with proxy re-encryption processing and fingerprint code processing, the key leakage risk in the cloud environment can be resisted, and the generality of the method makes it possible to construct a flexible and efficient comprehensive encryption scheme with the black box tracking characteristic.

Description

technical field [0001] The invention relates to a general black-box traceability method and device for an attribute-based proxy re-encryption system, belonging to the technical fields of information security and privacy protection. Background technique [0002] With the development of Internet and cloud computing technologies, more and more individual and organizational users choose to outsource data encryption to cloud storage to reduce the burden of local data and obtain timely data sharing services. However, semi-trusted cloud service providers and frequent cloud data leakage and damage have caused users to worry about the security of cloud storage. In order to ensure the confidentiality and integrity of cloud data, while enjoying fine-grained access control, waters et al. first proposed a Ciphertext-Policy Attribute-based Encryption (CP-ABE, Ciphertext-Policy Attribute-based Encryption) scheme in 2011. Among them, the encryption action of the data owner is equivalent to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/40H04L67/12
CPCH04L9/083H04L9/088H04L9/0822H04L9/0866H04L9/0894H04L63/0861H04L67/12
Inventor 张渊张苗仲盛
Owner NANJING UNIV