Unlock instant, AI-driven research and patent intelligence for your innovation.

Verifiable fine-grained access control inner product function encryption method

A technology of access control and encryption method, which is applied in the direction of user identity/authority verification, digital transmission system, and secure communication device, etc., which can solve problems such as vulnerability, achieve security, solve flexible authority control problems, and provide high security Effect

Pending Publication Date: 2022-07-29
GUIZHOU UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing inner product encryption schemes are designed based on discrete logarithm and integer factorization problems. With the rapid development of quantum computing technology, these traditional inner product encryption methods will be vulnerable in the post-quantum era

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable fine-grained access control inner product function encryption method
  • Verifiable fine-grained access control inner product function encryption method
  • Verifiable fine-grained access control inner product function encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031]like figure 1 , figure 2 As shown, a verifiable fine-grained access control inner product function encryption method according to the present invention includes the following steps:

[0032] Step 1. Based on set theory, give the definition of general access structure with hierarchical permissions: according to the attribute set U of the participants user , the logical operation set Θ and the hierarchical permission set R, fused with the power set of the attribute set of the participants Power Sets of Logical Operation Sets 2 Θ and a hierarchical permission set R, defining the Cartesian product:

[0033]

[0034] In this way, an authorized access tree structure space with hierarchical permissions is constructed:

[0035]

[0036] Define the subset Σ∈T of T as a general access structure with hierarchical permissions (also called authorization structure), and d( ) represents the degree of tree nodes;

[0037] Step 2. Based on the defined general access structur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a verifiable fine-grained access control inner product function encryption method. According to the method, construction of a fine-grained general access structure with hierarchical authority is taken as an entry point, the access structure is embedded into a user private key in a Boolean mode, an access control function encryption model with flexible and controllable encryption and decryption hierarchy is provided, access control and function calculation are deeply fused, and when user attributes meet the Boolean function, a function value is obtained after decryption; the quantum-attack-resistant verifiable fine-grained access control inner product function encryption method is designed by combining homomorphic signatures and based on the problem of LWE difficulty on lattices, partial encryption and decryption authority control is achieved, and compared with a traditional inner product encryption method based on bilinear mapping, the quantum-attack-resistant verifiable fine-grained access control inner product function encryption method is based on matrix operation, can support parallel algorithm design, and has the advantages of being simple in structure, convenient to operate and high in practicability. The efficiency is higher; the access control encryption method is designed according to the proxy re-encryption thought, hierarchical authority control is achieved, and the security of data in the cloud environment is guaranteed.

Description

technical field [0001] The invention relates to the technical field of data encryption, in particular to a verifiable fine-grained access control inner product function encryption method. Background technique [0002] With the rapid development of cloud computing technology, most users choose to encrypt data and upload it to the cloud in order to save local overhead. The traditional public key encryption system can only provide users with "one-to-one" coarse-grained access control, which is difficult to meet the needs of data sharing and processing in an open cloud computing environment. On the other hand, classifying and grading data according to the sensitivity of the data and the degree of harm after leakage has become the main method of data management and control. Therefore, how to organically integrate the access authority level of data into the encryption and decryption algorithm to achieve the goal of "available and invisible data, controllable partial encryption an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/105H04L63/0471H04L63/0442H04L9/3247
Inventor 彭长根侯金秋丁红发蒋合领田有亮
Owner GUIZHOU UNIV