Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-authorization attribute encryption and decryption method

An authorization attribute, encryption and decryption technology, applied in the field of encryption and decryption, can solve the problems of high consumption of encryption and decryption operations, high storage space occupancy rate, etc.

Active Publication Date: 2017-10-20
HENAN UNIV OF SCI & TECH
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide a multi-authorization attribute encryption and decryption method to solve the problems of high consumption of encryption and decryption operations and high storage space occupancy rate caused by sparse access structures in large-scale attribute encryption systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-authorization attribute encryption and decryption method
  • Multi-authorization attribute encryption and decryption method
  • Multi-authorization attribute encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] A method for encrypting and decrypting multiple authorization attributes, comprising the following steps:

[0046] Step 1. System initialization: including four aspects: the construction of the attribute access tree Γ of the hierarchical attribute organization, the generation of system parameters, the initialization of the central authorization organization, and the initialization of the attribute authorization organization;

[0047] (1) System parameter generation: input a security parameter 1 in the system λ , the system calls the group generation algorithm to generate two multiplicative cyclic groups G and G of order prime number p T , the generator of the group G is g, and there is a bilinear map e:G×G→G T , and at the same time, choose an existential unforgeable signature algorithm Σ sign =(KenGen,Sign,Verify), output global public parameters δ=(e,g,G,G T , p, Σ sign );

[0048] (2) Construction of hierarchical attribute access tree Γ: each attribute authority...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multi-authorization attribute encryption and decryption method comprising system initialization, data encryption, key distribution and ciphertext decryption and other steps. The multi-authorization attribute encryption and decryption method has the beneficial effects of solving the problems of large encryption and decryption operation consumption and high storage space occupation rate caused by the sparse access structure in a large-scale attribute encryption system, and compensating the shortcomings of other schemes on the aspect; meanwhile, the problem of computing efficiency and data storage rate are solved by the multi-authorization attribute encryption and decryption method, and the multi-authorization attribute encryption and decryption method also has collusion attack resistance and plaintext attack selection security.

Description

technical field [0001] The invention relates to the field of encryption and decryption, in particular to a multi-authorization attribute encryption and decryption method. Background technique [0002] As a new type of cryptosystem algorithm, attribute-based encryption method has been widely concerned and applied in cloud storage technology, social network, online on-demand and other fields. Compared with traditional encryption algorithms, attribute-based encryption algorithms not only realize fine-grained access control, but also can formulate more flexible access control policies. [0003] Attribute Based Encryption (ABE), which regards a series of user identity information as the input of data encryption and decryption, only users who meet the access control policy formulated by the data owner can obtain data information, thus It solves the problem that the previous encryption algorithm cannot realize one-to-many communication. At the same time, the data owner can also fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L9/00
CPCH04L9/002H04L9/0825H04L9/0861H04L9/3247
Inventor 张志勇靳正芬李成张丽丽李玉祥赵长伟向菲牛丹梅
Owner HENAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products