Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attribute reversible encryption system and method resistant to re-encryption key disclosure

An encryption system and re-encryption technology, applied in the transmission system, digital transmission system, public key of secure communication, etc., can solve security problems, cannot realize fine-grained attribute revocation, and cannot solve the problem of proxy re-encryption server key leakage And other issues

Active Publication Date: 2019-06-21
XIDIAN UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to overcome above-mentioned prior art when carrying out proxy re-encryption, has adopted untrustworthy proxy re-encryption server to manage re-encryption key, can't solve the key leakage problem of proxy re-encryption server; , timely attribute revocation; embedding the attribute revocation list into the ciphertext may cause security problems; although it can resist the collusion attack between multiple illegal users, it cannot resist the collusion attack between the illegal user and the proxy re-encryption server , providing an attribute reversible encryption system and method against re-encryption key leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute reversible encryption system and method resistant to re-encryption key disclosure
  • Attribute reversible encryption system and method resistant to re-encryption key disclosure
  • Attribute reversible encryption system and method resistant to re-encryption key disclosure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The present invention will be further described below in conjunction with the accompanying drawings.

[0091] Refer to attached figure 1 , to further describe the system of the present invention.

[0092] The system of the present invention includes an authorization center module, a data owner module, a data storage module, an agent re-encryption module, and a data receiver module. The data owner module is respectively connected with the authorization center module and the data storage module. The data receiver module is connected with the communication module 2 in the proxy re-encryption module. The authorization center module is respectively connected with the data owner module, the data receiver module and the proxy re-encryption module. The agent re-encryption module is respectively connected with the authorization center module and the data storage module. in:

[0093] The authorization center module is used to set the parameters of the encryption system, gene...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an encryption system and method for resisting re-encryption key leakage and capable of cancelling attributes. The method comprises: 1, setting the parameters of an encryption system; 2, generating the main private key and the public key of the encryption system; 3, generating a user private key; 4, building a re-encryption key tree; 5, generating a cryptograph file; 6, cancelling attributes; 7, performing re-encryption agency; 8, accessing the cryptograph file; 9, determining whether the update position of the cryptograph file is 1 or not; 10, decrypting an un-updating cryptograph file; 11, updating the private key; 12, decrypting the update cryptograph file; and 13, quitting the encryption system. Through adoption of a dual-agency re-encryption server model, the encryption system and method for resisting re-encryption key leakage and capable of cancelling attributes can resist the leakage of the re-encryption key. When the attributes are cancelled, an attribute user group is employed to construct the re-encryption key tree so as to effectively, timely and accurately cancel the indirect attributes. When the encryption is performed, the secret is dispersed to resist the conspiracy attack.

Description

technical field [0001] The present invention belongs to the technical field of data encryption, and further relates to an attribute-reversible encryption system and method in the technical field of data security that resist re-encryption key leakage. The invention can be used to realize fine-grained access control and data protection in the cloud storage environment. Background technique [0002] The attribute-based encryption method is a new public key encryption method that supports the many-to-many mode, that is, the decryption object is no longer just a specific user, but a group that meets the decryption conditions. This feature enables attribute-based encryption methods to be used to implement fine-grained access control. Attribute-based encryption methods mainly include two types, which are ciphertext-policy attribute-based encryption methods and key-policy attribute-based encryption methods. In the ciphertext policy attribute-based encryption method, the access str...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08
CPCH04L9/0836H04L9/0869H04L9/0891H04L9/3033
Inventor 傅晓彤高杨张宁谭示崇陈思
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products