Unlock instant, AI-driven research and patent intelligence for your innovation.

Attribute encryption method and device for resisting key abuse on lattice, computer equipment and storage medium

An attribute encryption and key technology, which is applied in the field of lattice anti-key abuse, can solve the problems of bilinear pairing and high overhead, and achieve the effects of avoiding bilinear operations, high efficiency, and low overhead

Pending Publication Date: 2022-08-05
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Traditional ciphertext policy attribute encryption schemes are usually constructed based on bilinear mapping. In the process of encryption and decryption, complex bilinear pairing brings huge overhead, which has been criticized by people for a long time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute encryption method and device for resisting key abuse on lattice, computer equipment and storage medium
  • Attribute encryption method and device for resisting key abuse on lattice, computer equipment and storage medium
  • Attribute encryption method and device for resisting key abuse on lattice, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0035] It is to be understood that, when used in this specification and the appended claims, the terms "comprising" and "comprising" indicate the presence of the described features, integers, steps, operations, elements and / or components, but do not exclude one or The presence or addition of a number of other features, integers, steps, operations, elements, components, and / or sets thereof.

[0036] It should further be understood that, as us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a lattice anti-key abuse attribute encryption method and device, computer equipment and a storage medium, and the method comprises the steps: obtaining an access request of a user, and embedding an encryption identifier of user identity information into a user private key to form a key; judging whether the secret key is leaked or not; if the secret key is leaked, the user ID in the leaked secret key is calculated, the user ID is revoked from the white list, and access is terminated. According to the method, on the basis of realizing key tracking and key delegation abuse resistance, complex bilinear operation is avoided, and compared with an attribute encryption scheme on LWE, the efficiency is higher, the overhead is smaller, and the requirements can be better met.

Description

technical field [0001] The present invention relates to the technical field of anti-key abuse on the grid, in particular to an attribute encryption method, device, computer equipment and storage medium with anti-key abuse on the grid. Background technique [0002] As a new functional cryptographic technology, attribute encryption has attracted widespread attention in the industry since it was proposed in 2005. Especially with the rapid development of Internet of Things and big data technology, the amount of data in cyberspace is increasing day by day, which brings information security problems. more and more people pay attention. Because attribute encryption has natural advantages in data protection and access control, researching a complete attribute encryption scheme and exploring its potential application scenarios has always been a hot research topic. [0003] Traditionally, attribute encryption is generally divided into ciphertext strategy and key strategy. As the name...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/40
CPCH04L9/0866H04L63/10H04L63/0428Y04S40/20
Inventor 郭凯阳韩益亮吴日铭刘凯
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE