Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Attribute-Based Encryption Method Against Leakage of Key Continuous Auxiliary Input

A technology for auxiliary input and attribute encryption, which is applied in the field of cryptography, and can solve problems such as rare, uncombinable use of cryptography schemes, key leakage, etc.

Active Publication Date: 2018-08-14
深圳市豪斯莱科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, so far, there are few studies on solving the key disclosure problem under side-channel attacks in ABE.
[0006] Aiming at the problem of key leakage under side channel attack in ABE, Lewko et al. [12] At the TCC annual meeting, the dual-system encryption and the bounded leakage model were combined to propose an adaptive security ABE scheme against continuous memory leakage, which supports the leakage of the master key and user attribute private key, but only the key is allowed Bounded leakage of , requires that the old version of the key must be completely cleared from memory, and this scheme cannot be used in combination with other cryptographic schemes
However, in practical applications, due to the wide variety of ABE key construction methods, it is easier to use ABE in combination with other cryptosystems. In particular, the old version of the key often retains some information in the memory after the update

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Attribute-Based Encryption Method Against Leakage of Key Continuous Auxiliary Input
  • An Attribute-Based Encryption Method Against Leakage of Key Continuous Auxiliary Input
  • An Attribute-Based Encryption Method Against Leakage of Key Continuous Auxiliary Input

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention will be described in detail below in conjunction with the implementations shown in the drawings, but it should be noted that these implementations are not limitations of the present invention, and those of ordinary skill in the art based on the functions, methods, or structural changes made by these implementations Equivalent transformations or substitutions all fall within the protection scope of the present invention.

[0054] Please refer to figure 1 and figure 2 Shown is a specific implementation of an attribute-based encryption method against key continuous auxiliary input leakage in the present invention.

[0055] The implementation of an attribute-based encryption method against key continuous assisted input leakage shown in this embodiment relies on an attribute-based encryption computer system, which includes: a user, which acts as a message encryption party or a ciphertext Receiver; a private key generation center, as a trusted third p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an attribute-based encryption method for resisting continuous auxiliary input leakage of secret keys. The method comprises that a private key generation center inputs a system security parameter lambda and a legal attribute set U, constructs an m-dimensional vector and embeds the m-dimensional vector in a system public key PK and a system master secret key MSK; the private key generation center authenticates an attribute set omega own by a user and generates a user private key Skomega containing the m-dimensional vector by utilizing the system master secret key MSK and the system public key PK; an encryption party encrypts to-be-encrypted information by utilizing the system public key PK and a set access strategy, thus generating ciphertexts containing mn <1 >-dimensional vector; and a user can decrypt to obtain plaintexts only when the attribute of the user private key Skomega satisfies the access strategy of the ciphertexts. According to the method, the system master secret key MSK and the user private key Skomega can be continuously and limitlessly leaked; the compatibility of the user private key Skomega is improved; and on the premise of ensuring the security of the encryption information, the length of the system master key and the length of the user private key are reduced.

Description

technical field [0001] The invention relates to the technical field of cryptography, in particular to an attribute-based encryption method against key continuous auxiliary input leakage. Background technique [0002] As an important branch of modern cryptography, public key cryptography has developed rapidly in recent years. In the public key encryption mechanism, each legal user has a pair of different encryption key and decryption key, and it is computationally infeasible to deduce the decryption key from the known encryption key. The encryption key can be made public, and the decryption key must be kept secret by the user himself, that is, the user cannot disclose any bit of information to others, otherwise, the security of the system will be destroyed. Therefore, the security of the public key encryption mechanism is based on the fact that the decryption key must be kept secret. [0003] Modern cryptography assumes that all attackers cannot obtain any information about...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/00H04L9/30
CPCH04L9/002H04L9/083H04L9/0866H04L9/0869H04L9/088H04L9/0891H04L9/30
Inventor 马海英王占君管致锦陈建平程学云王金华朱洁卢秋如李晓静
Owner 深圳市豪斯莱科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products