Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

184 results about "Attribute-based encryption" patented technology

Attribute-based encryption is a type of public-key encryption in which the secret key of a user and the ciphertext are dependent upon attributes (e.g. the country in which he lives, or the kind of subscription he has). In such a system, the decryption of a ciphertext is possible only if the set of attributes of the user key matches the attributes of the ciphertext.

Multistage authority management method for cloud storage enciphered data sharing

The invention relates to a multistage authority management method for cloud storage enciphered data sharing. The methods such as attribute based encryption, access control and authority management are used for providing a reliable method for access and multistage authority management of a shared cipher text in the cloud storage environment. Through mixing encrypt system, the multistage authority management method for cloud storage enciphered data sharing comprises steps: firstly applying a symmetric encryption algorithm to encrypt data, and generating a content cipher text; then adopting the attribute based encryption to encrypt according to different authority information, and generating an authority cipher text; adopting the attribute based encryption scheme to encrypt a symmetric key and the authority cipher text, regarding the symmetric key and the authority cipher text as a file header of the content cipher text, and generating a final cipher text. The multistage authority management method for cloud storage enciphered data sharing has the advantages of being convenient to achieve, strong in user information protectiveness, fine in authority control grit and the like. Under the premise that a server is not credible, the flexible and extensible authority management to the shared enciphered data is supported, the privacy and the security of the user data and authority information are effectively ensured, and the multistage authority management method for cloud storage enciphered data sharing has good practical value and wide application prospect in the cloud storage field.
Owner:HANGZHOU YUANTIAO TECH CO LTD

Cloud storage access control system based on attribute

The invention provides a cloud storage access control system based on an attribute. The cloud storage access control system based on the attribute comprises a security token unit (1), a main body information management unit (2), an access control unit (3), an attribute base encryption and decryption unit (4) and a cloud storage unit (5), wherein the security token unit (1) is used for achieving the function of identity authentication, the function of token distribution and the function of token verification, the main body information management unit (2) is used for achieving the function of generating a user private key, the function of storing user attribute information and the user private key, and the function of symmetric keys after encryption of an access control policy, the access control unit (3) is used for achieving the function of access control based on the attribute, and the function of user customization of the access control policy, the attribute base encryption and decryption unit (4) is used for achieving the function of encryption and decryption of files, and the function of using the access control policy and the user private key to carry out encryption and decryption on the symmetric keys, and the cloud storage unit (5) is used for achieving the function of storage of plaintext and ciphertext. The cloud storage access control system based on the attribute has the advantages of being fine in grit, real-time, dynamic, extensible, safe and the like, and can be used for achieving access control in the cloud storage environment.
Owner:XIDIAN UNIV

Ciphertext policy attribute-based encryption system and method

The invention provides a ciphertext policy attribute-based encryption system and a ciphertext policy attribute-based encryption method, which comprise ciphertext policy attribute-based encryption systems with a central mechanism and without the central mechanism and a ciphertext policy attribute-based encryption method. The ciphertext policy attribute-based encryption system with the central mechanism comprises a plurality of attribute mechanisms of the central mechanism, an encrypting component and a client. The plurality of attribute mechanisms of the central mechanism initialize the system together, publish a system public key, and generate a system private key, a local private keys of an attribute mechanism and local public keys; the encrypting component encrypts a cleartext based on the system public key, each local public key and a universal access tree; and the client inputs a client identifier, client attribute sets and the like so as to generate client private key used for decrypting the encrypted ciphertext. Due to the implementing mode of the invention, a multi-mechanism ciphertext policy attribute-based encryption system is designed. The scheme is based on the ciphertext policy, so the scheme better meets the access control requirement in an actual information safety system.
Owner:SHANGHAI JIAO TONG UNIV

Multi-mechanism hierarchical attribute-based encryption method applied to cloud storage

The invention discloses a multi-mechanism hierarchical attribute-based encryption method applied to cloud storage. The method comprises the steps that authorization centers determine recursion depths, select bilinear mappings and bilinear groups, generate a system MK and a PK, reserve the MK, and disclose the PK; the authorization centers allocate a master key authorized at the next stage (the step is executed when a subcenter exists); the central authorization center receives a user identity file and generates an attribute set A for the user identity file; the authorization centers generate a secret key SK for a user and distribute the SK to the user; a data owner DO generates an access strategy tree, the file is encrypted through an Encrypt method, and a ciphertext CT is uploaded to the cloud end; the user sends a request to the cloud end to have access to the file, the CT of the file is sent back through the cloud end, the user decrypts the file by means of the SK, and only when the attribute in the user SK meets an access control strategy of the file, complete decryption can be achieved; if decryption succeeds, a plaintext M is obtained by the user; if decryption does not succeed, it is shown that the user has no right to have access to the file.
Owner:NANJING UNIV OF POSTS & TELECOMM

Encryption method and system based on attributes

The invention discloses an encryption system based on attributes. The encryption system comprises a system parameter setting module, a key generation module, an encryption module, a decryption module, a cryptograph retrieval module, a re-encryption key generation module, a re-encryption module and a private key re-generation module, wherein the system parameter setting module is used for generating system public parameters, the key generation module is used for generating private keys of users for decrypting messages according to attribute sets of the users; the encryption module is used for encrypting the messages; the decryption module is used for decrypting the messages, the cryptograph retrieval module is used for retrieving the cryptographs; the re-encryption key generation module is used for generating re-encryption keys and updating the cryptographs and the private keys; the re-encryption module is used for re-encrypting the messages on the basis of the original cryptographs; the private key re-generation module is used for updating the private keys of the users. The invention further discloses an encryption method based on the attributes. By the encryption system and method based on the attributes, the problem of privacy protection during cloud computing can be solved, attribute withdrawal and safety retrieval of the cryptographs are supported, and the encryption system is high in flexibility.
Owner:HOHAI UNIV

Method and system for implementing credit by using union block chain based on attribute-based encryption

The invention discloses a method and system for implementing credit by using a union block chain based on attribute-based encryption, and relates to the technical field of block chains. The method includes: constructing a union chain and a consensus mechanism of a plurality of bank nodes; allowing a central bank node to generate a master private key and a master public key, generating a private key of each bank node according to the master private key and an attribute set respectively assigned to each bank node and distributing the private key to each bank node correspondingly, and broadcasting the master public key; allowing a lending bank node N of the user A to use the master public key and a preset access control structure to encrypte credit information of a user A, recording a ciphertext CT in a block chain on the basis of the consensus mechanism, allowing a bank node M to use the private key thereof to decrypt the ciphertext CT associated with the user A in the block chain when the user A borrows from the bank node M and if the attribute set of the bank node M satisfies the access control structure, and determining whether to loan to the user A according to the decryption result. The method and system can improve the credit evaluation efficiency and ensure the privacy and security of the credit information.
Owner:ZHONGAN INFORMATION TECH SERVICES CO LTD

Attribute-based encryption method for achieving hierarchical certification authority

ActiveCN103647644AFacilitate hierarchical distributionEase of distributed managementKey distribution for secure communicationPublic key for secure communicationCiphertextAttribute-based encryption
The invention discloses an attribute-based encryption method for achieving a hierarchical certification authority. The attribute-based encryption method for achieving the hierarchical certification authority mainly comprises the following steps of 1) initialization of a central authority; 2) initialization of multilayer certification authorities; 3) user registration and certification; 4) extraction and distribution of private keys; 5) encryption; 6) decryption. The attribute-based encryption method for achieving the hierarchical certification authority achieves hierarchical distribution of multiple certification authorities on the basis of an attribute-based encryption system of a ciphertext policy, facilitates management of the central authority to the certification authorities, and is applicable to shared data encryption solution in a large organization structure of hierarchical distribution. Besides, during the extraction and distribution process of the private keys, overlapping among attribute sets of different users is allowed, so that the attribute-based encryption method for achieving the hierarchical certification authority has wider adaptability in practical application.
Owner:BEIHANG UNIV

Internet of things (IoT) privacy protection method and system for preventing ciphertext from being tampered based on CP-ABE

The invention discloses an Internet of things (IoT) privacy protection method and an IoT privacy protection system for preventing ciphertext from being tampered based on CP-ABE. The method provides a ciphertext strategy attribute-based encryption mechanism, a vehicle node sending a message can autonomously develop an access strategy according to the attribute of the vehicle node receiving the message, the access strategy is deployed in the ciphertext, only the attribute of the vehicle node receiving the message is met, successful decryption can be achieved, and extremely strong flexibility is provided. Meanwhile, in order to prevent the sent message from being captured and tampered, a credible authorization center maps the ciphertext and a related parameter into a random number by using a Hash function, when performing decryption, a message accepter firstly verifies whether the message is tampered, and then decrypts the message if the message is not tampered. Not too much complex computation is introduced into the scheme; according to the scheme, interaction efficiency between the vehicle nodes is improved, while security of communication between the vehicle nodes in the Internet of things is ensured.
Owner:HUNAN UNIV OF SCI & ENG

Revocable attribute base encryption method

The invention discloses a revocable attribute base encryption method. A master public key and a master key are generated for a system through a trusted authentication mechanism, and an attribute usergroup corresponding to each attribute is transmitted to a data management server after user attributes needing to be registered are verified and corresponding private keys are generated. The data management server generates a corresponding KEK two binary tree for each user, distributes an attribute group key, re-encrypts a cipher text encrypted by a data owner, and sends data use requests of the users the users after receiving the data use requests. When the trusted authentication mechanism receives a request of updating a user attribute group, the user attribute group can be updated in time,the data management server is informed of an updated user list, and the data management server performs key update of the user attribute group. If and only if a user is not revoked from an attribute group and is granted permission, the user can perform decryption. Through adoption of the revocable attribute base encryption method, flexible expression of an access strategy is implemented, and the forward and backward security of encrypted data is ensured. The method has high expansibility and practicability.
Owner:SHANGHAI MARITIME UNIVERSITY

Encryption method applied to MQTT-SN protocol

The invention relates to an encryption method applied to a MQTT-SN protocol, and relates to the field of communication. The method employs a harsh algorithm and ciphertext-policy attribute-based encryption method, so that a publishing terminal, an agent server and one or a plurality of subscription terminals can complete encrypted communication. The method herein includes the following steps: an agent server verifying the identity of a publishing/subscription terminal, performing registration of the publishing/subscription terminal, and generating a system common parameter; the publishing terminal encrypting a plaintext load by using the ciphertext-policy attribute-based encryption method; the publishing terminal transmitting the encrypted load to the agent server, the agent server forwarding the encrypted load to one or a plurality of subscription terminals; and the subscription terminal applying for a secrete key from the agent server, decrypting the encrypted load, obtaining a plaintext. According to the invention, the method can implement identity verification of a MQTT-SN protocol publishing/subscription terminal, data integrity verification, and data confidentiality protection, and better addresses the safety issues faced by the MQTT-SN protocol in terminals of wireless sensor network applications.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Ciphertext searching method and system supporting access control

The invention is applicable to the field of data processing, and provides a searching method supporting access control. The searching method comprises the steps that: a client encrypts files of a database to obtain encrypted ciphertexts, and indexes are established and encrypted according to file identifiers to obtain a ciphertext database; the client receives a key ciphertext, a private key and aretrieval keyword set to generate a trap door; a cloud server retrieves the corresponding index ciphertext according to the trap door; the client carries out decryption on the index ciphertext by utilizing a key, uploads the file identifier obtained by decryption to the cloud server to obtain the encrypted ciphertext, and the encrypted ciphertext is decrypted to obtain a search result; and the client shows the search result according to a preset showing mode. In the implementation process of the embodiment of the invention, the ability of a searching client for data access is controlled by adopting attribute-based encryption, but access control is set to be carried out in the overall database instead of the indexes, so that calculation cost when a data owner encrypts the database can be greatly reduced; and meanwhile, in the process that a user acquires the search trap door, the data owner does not need to participate in.
Owner:SHENZHEN UNIV

Multi-authority ciphertext-policy attribute-based encryption method

The invention discloses a multi-authority ciphertext-policy attribute-based encryption method. The method includes following steps: step 1, performing system initialization and establishing a plurality of authorities; step 2, before each starting of a mobile terminal device, executing pre-encryption treatment, and generating an intermediate ciphertext; step 3, in a process of uploading the intermediate ciphertext to a cloud storage server, encrypting the intermediate ciphertext by employing an access policy defined by a linear secret sharing mechanism, and outsourcing the intermediate ciphertext to the cloud storage server; and step 4, generating a private key for an encryption file according to global identifiers of users and an attribute set of the users by each authority. According to the method, aiming at the mobile cloud storage environment, on the premise of guaranteeing the data security, a lot of pairing operations are pre-processed in advance by employing the encryption pre-processing technology so that the calculation cost of online encryption is minimum; and by employing the secret key transformation technology and decryption outsourcing, a lot of pairing operations are outsourced to the cloud storage server so that the decryption calculation cost of the mobile terminal is reduced.
Owner:ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products