Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Anti-leak cp-abe method under policy hiding and outsourced decryption

A CP-ABE and policy technology, applied in the field of information security, can solve problems such as unavoidable side channel attacks

Active Publication Date: 2020-05-26
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In practical applications, many encryption schemes are difficult to avoid side channel attacks, which allows attackers to learn part of the key information by observing the physical properties of the encryption process (time, power consumption, temperature, radiation, etc.)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-leak cp-abe method under policy hiding and outsourced decryption
  • Anti-leak cp-abe method under policy hiding and outsourced decryption
  • Anti-leak cp-abe method under policy hiding and outsourced decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention is described in further detail now in conjunction with accompanying drawing.

[0045] The CP-ABE scheme proposed by the present invention has three characteristics of anti-leakage, policy hiding and outsourcing decryption. Its use process includes the following five algorithm steps:

[0046] (1) Initialization algorithm (λ, Σ):

[0047] The initialization algorithm inputs a security parameter λ, an attribute space Σ, Σ is the name of the attribute space, which represents all attribute sets, and each attribute can be mapped to a group An element in , U=|Σ| is the size of the attribute space, and m is the number of shares of the key, which is related to the security of the algorithm. The algorithm runs a bilinear group generator to generate where P 1 , P 2 , P 3 are three different large prime numbers, is a bilinear pairing operation, with is a multiplicative cyclic group with prime order N, yes the order is p i subgroup of . T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-leakage CP-ABE (Ciphertext Policy-Attribute-Based Encryption) method under strategy hiding and outsourcing decryption. The anti-leakage CP-ABE method under strategy hiding and outsourcing decryption mainly realizes a CP-ABE scheme with three characteristics: leakage resistance, strategy hiding and outsourcing decryption, and belongs to the information safety field. The anti-leakage CP-ABE method under strategy hiding and outsourcing decryption utilizes a composite number order bilinear group to construct parameters, and adds the elements in a sub group Gp2 of the composite number order bilinear group in the main public key and the encryption algorithm to achieve the effect of hiding the access strategy. Besides, the algorithm decomposes the decryption process and adds an outsourcing decryption algorithm, and at the same time utilizes a double key system to enable the third party to be unable to completely decrypt the cryptograph, thus reducing the computing cost and guaranteeing safety of the user private key and the cryptograph. Compared with traditional anti-leakage scheme, the anti-leakage CP-ABE method under strategy hiding and outsourcing decryption has the advantages of leakage resistance, strategy hiding, outsourcing decryption, and higher safety, and greatly reduces the computing cost for decryption for the user.

Description

technical field [0001] The invention belongs to the field of information security, and proposes an anti-leakage CP-ABE scheme under policy concealment and outsourced decryption, mainly realizing the CP-ABE scheme with three characteristics of anti-leakage, policy concealment and outsourced decryption. Background technique [0002] With the development of cloud computing, it has become a trend for users to store their own data on cloud servers. However, it is very inefficient to distribute these encrypted data to specific groups of users using traditional encryption schemes, such as PKI, identity-based encryption schemes. Because the length of the ciphertext and the calculation cost of the encryption / decryption algorithm are linearly related to the number of accepted users. To solve this problem, Sahai and Waters proposed the concept of Attribute-Based Encryption (ABE) in 2005. In attribute-based encryption, ciphertexts and keys are related to attribute sets and attribute-b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0825H04L9/0838H04L9/0847
Inventor 曹成王志伟
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products