Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Hierarchical Attribute Encryption Scheme

An encryption scheme, a technology of layered attributes, applied in the usage of multiple keys/algorithms, transmission systems, electrical components, etc.

Active Publication Date: 2018-10-19
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security of the existing CP-HABE scheme based on hierarchical access structure is only safe under the assumption of deterministic (q-parallel) bilinear Diffie-Hellman index

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Hierarchical Attribute Encryption Scheme
  • A Hierarchical Attribute Encryption Scheme
  • A Hierarchical Attribute Encryption Scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment is based on the technical solution, and provides detailed implementation and specific operation process, but the protection scope of the present invention is not limited to the present invention. Example.

[0074] Such as figure 1 As shown, a layered attribute encryption scheme includes a message M; the scheme includes the following steps:

[0075] S1 initialization and establishment algorithm: first input the attribute set U containing all attributes, and the attributes are in different layers; then select an order of N=p 1 p 2 p 3 Bilinear composite group G, p 1 ,p 2 ,p 3 are different prime numbers, let Indicates that the order is p i The subgroup of , i=1,2,3; then choose random exponents a and α, random group elements where a,α∈Z N ,Z N Represents an integer from 1 to N-1; for |U| attribute elements in U, select t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hierarchical attribute encryption method. The method comprises a first step of inputting an attribute set U firstly, and then selecting a mixed order bilinear composite group and obtaining a public parameter PK and a master secret key (MSK) according to the mixed order bilinear composite group, wherein attributes are in different hierarchies; a second step of inputting the public parameter (PK), a message (M) and an improved access structure (MV, rho), and obtaining a ciphertext (CT), wherein the function rho represents a map from lines to attributes in the access structure MV; a third step of inputting the MSK and an attribute set S with different hierarchies so as to generate a secret key (SK); and a fourth step of inputting the CT corresponding to the access structure MV and the SK corresponding to the attribute set S, allowing quantity of attributes of S in each hierarchy to exceed a threshold, allowing S to meet a hierarchical access structure, and recovering the M. The hierarchical attribute encryption method can realize fine grained access control and hierarchical attributes of user data encryption, and is improved to a completely safe level under a standard model.

Description

technical field [0001] The invention relates to the technical field of data encryption, in particular to a layered attribute encryption scheme. Background technique [0002] Attribute-based encryption (ABE) is an important branch of identity-based encryption. In the attribute-based encryption system, identity information is no longer represented by an element, but replaced by a series of descriptive attributes, and a flexible access structure is added, which is composed of several attributes and thresholds. As a result, only when the access structure matches the attribute set, can the correct plaintext message be successfully decrypted. The biggest advantage of the attribute encryption mechanism is that it is not necessary to specify who should decrypt it, as long as the receiver meets the set conditions, it can be successfully decrypted. The attribute encryption mechanism is no longer a simple one-to-one encryption, but a new type of public key encryption that supports th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L29/06
Inventor 李学俊赵佩李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products