Multi-Authoritative Key Policy on Lattice Attribute-Based Encryption Method

An encryption method and attribute technology, applied in the field of information security, can solve problems such as cooperation between different institutions, low workload, and inability to implement encryption methods

Active Publication Date: 2018-04-10
XIAN UNIV OF TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an attribute-based encryption method with a multi-authoritative key policy on the grid, which solves the problem that the existing encryption methods in the prior art cannot realize the cooperation of different organizations and have a low workload

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-Authoritative Key Policy on Lattice Attribute-Based Encryption Method
  • Multi-Authoritative Key Policy on Lattice Attribute-Based Encryption Method
  • Multi-Authoritative Key Policy on Lattice Attribute-Based Encryption Method

Examples

Experimental program
Comparison scheme
Effect test

example

[0102] Example: Suppose challenger B randomly selects (lm+1) vectors And visit the oracle machine O to obtain (lm+1) LWE oracle machine samples and mark them as follows:

[0103]

[0104] Target: Adversary A announces the list of target attributes that it wants to attack, denoted as Attrib * , that is, the target to be challenged,

[0105] Setting: B Construct public attribute public key Apk as follows:

[0106] 1 vector is obtained from sampling with index 0, that is, s=w 0 ;

[0107] 2 For each i ∈ [l] and such that the attribute i ∈ Attrib * The corresponding public key matrix of is constructed from the LWE oracle to the sample with index i, namely

[0108] 3 For each i∈[l] and the attribute The corresponding matrix A i It is constructed according to the TrapGen algorithm in the real scheme, where the TrapGen algorithm is combined with a low-norm full-rank matrix B i makes A i B i = 0, all indexes in the LWE sampling here samples of are not used;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attribute-based encryption method for a lattice multi-authority key strategy. The method comprises the following steps of firstly, establishing a system; secondly, generating a key; thirdly, encrypting a message; and lastly, decrypting the message, wherein a key management center of the system is formed by utilizing a center authority and a plurality of authorities charging different attributes, and is used for issuing the key to each user together, so that the practicability of attribute encryption is improved, the security of a scheme is proved, and the efficiency of the scheme is decided along with the number of the attributes participating in encryption and decryption, and is not decided by upper bounds of the attributes participating in encryption and decryption in the system. The method solves the problems that the encryption method in the prior art is unable to implement cooperation of different mechanisms and is low in workload.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an attribute-based encryption method of a lattice multi-authoritative key strategy. Background technique [0002] Attribute-based encryption is a relatively new research direction. Compared with traditional cryptography, attribute-based encryption provides a more flexible encryption-decryption relationship. From the previous one-to-one encryption mode to one-to-many mode. And attribute-based encryption realizes the function of user access control: 1. It can effectively prevent illegal users from accessing protected network resources; 2. Allow legitimate users to access protected network resources; 3. Prevent legitimate users from accessing protected network resources. Unauthorized access to resources. The server in the system only manages the encrypted resources, but cannot actually access the data, ensuring the security and privacy of user data. This ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0819H04L63/064
Inventor 王尚平冯芳王晓峰
Owner XIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products