Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

ABOOE method capable of being proved to be safe

An encryption method and attribute technology, applied in the construction field of ABOOE

Active Publication Date: 2014-08-06
北京未来云服科技有限公司
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, Chow et al. also raised the new question whether it is possible to construct a provably secure attribute-based online / offline encryption mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ABOOE method capable of being proved to be safe
  • ABOOE method capable of being proved to be safe
  • ABOOE method capable of being proved to be safe

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] 1. At first introduce the definition of relevant basic knowledge with the method of the present invention, mainly comprise

[0017] Symmetric bilinear pair definition: let and is the multiplicative cyclic group of order large prime number p, g is The generator of , if there is a mapping e: Satisfy the following conditions: (1) bilinear: for e(u a ,v b )=e(u,v) ab ; ⑵ Non-degenerate: e(g, g)≠1; ⑶ Calculability: There exists an efficient algorithm to compute e(u,v) in polynomial time; then the above mapping e is said to be a symmetric bilinear pairing.

[0018] l-DBDHI hypothesis definition: The l-DBDHI problem is in The above definition is: randomly select α∈Z p * , g is The generator of , given a (l+2) tuple Determine whether the value of T is e(g,g) 1 / α . If for any probabilistic polynomial time (PPT) algorithm exist The advantages of solving the l-DBDHI problem above are all negligible, then the l-DBDHI hypothesis is said to be in abov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an ABOOE method. The ABOOE method has the plaintext safety selection function and the ciphertext safety selection function. The encryption process based on ABE is decomposed into the offline stage and the online stage. At the offline stage, on the premise that plaintexts and needed attribute sets are unknown, complex calculation need by encryption is preprocessed; at the online stage, after messages and the attribute sets are known, ciphertexts can be generated only with a small amount of simple calculation. A construction method and corresponding schemes of an ABOOKEM are provided, and the safe and universal ABOOE method for converting the one-way ABOOKEM into CCA is constructed. According to the method, safety of the ABOOE method is effectively improved on the premise that the calculated amount is not increased. According to the ABOOE method, encryption efficiency of ABE is improved, and the ABOOE method is suitable for terminal equipment of which the calculated amount is highly limited.

Description

technical field [0001] The present invention relates to Attribute-Based Online / Offline Encryption (ABOOE) methods, including ABOOE ​​methods with Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA), and moreover to mechanisms including Attribute-Based Online / Offline Key Encapsulation A construction method of (ABOOKEM) and a construction method for converting one-way ABOOKEM into ABOOE ​​with security of selected ciphertext. Background technique [0002] The Attribute-Based Encryption (ABE) mechanism was first proposed by Sahai and Waters at the Omi Conference in 2005. In this ABE, attributes are used to identify the characteristic information of the user (for example, students have attributes such as departments, majors, and student categories), and the authorization center issues private keys for them according to the attributes the user has. The encryptor uses a set of attribute public keys to The predetermined threshold value is used for encryption, and the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
Inventor 马海英王占君陈建平王春明曹利王金华魏晓宁
Owner 北京未来云服科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products