Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Distributed Multi-Authorizer Ciphertext Policy Attribute-Based Encryption Method with Media Obfuscation

A technology of attribute-based encryption and ciphertext strategy, applied in the field of cloud computing security, can solve problems such as collusion attacks, achieve efficient access control, realize dynamic domain management, and the method is safe and efficient.

Active Publication Date: 2022-08-05
FUJIAN NORMAL UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, malicious users have the opportunity to collect decryption private keys through illegal methods and launch collusion attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Distributed Multi-Authorizer Ciphertext Policy Attribute-Based Encryption Method with Media Obfuscation
  • A Distributed Multi-Authorizer Ciphertext Policy Attribute-Based Encryption Method with Media Obfuscation
  • A Distributed Multi-Authorizer Ciphertext Policy Attribute-Based Encryption Method with Media Obfuscation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described below with reference to the accompanying drawings and embodiments.

[0037] Please refer to figure 1, the present invention provides a distributed multi-authorized party ciphertext policy attribute base encryption method of media confusion, provides a system including a public parameter setting server, a data owner Do, a cloud storage server Css, a data user DU and a media MDR, including The following steps:

[0038] Step S1: Input security parameter 1 in the public parameter setting server λ , get the public parameter PP and the pseudo-random function PRF( ); establish L attribute authorization centers Per property authority Manage the corresponding property set And establish a trusted medium between the data owner and the data user, generate a pseudo-random function PRF( ) and secretly send it to all attribute authorization centers (AAs) and the medium;

[0039] Step S2: the attribute authorization center inputs ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a distributed multi-authority ciphertext strategy attribute-based encryption method with media confusion. When a new attribute authorization center joins the system, it will be secretly distributed a pseudo-random function PRF(·). In order to prevent the collusion of users who possess all relevant attributes in a certain relevant attribute management domain, in this system, a trusted medium (MDR) is employed. A data owner generates a ciphertext CT containing an obfuscation function. It is not necessary to maintain online interaction because of the use of secure DO. At the same time, the key passed by DO to MDR is used to receive the key sk obtained by user U from MDR. U function variable. sk U is determined by PRF( ) and U's Gid U wait for the calculation. U has the ability to compute functions without revealing internal program secrets. I represents the set of serial numbers of the attribute authorization center AAs that manage the attributes of U. If the identity ID of U is confirmed U After that, the corresponding private key USK will be issued for user U j , and the MDR sends the private key sk U to user U. Ultimate U by using and USK j (j∈I) to decrypt the ciphertext CT.

Description

technical field [0001] The invention relates to the technical field of cloud computing security, in particular to a distributed multi-authorization party ciphertext policy attribute-based encryption method with media confusion. Background technique [0002] Cloud computing is a new type of computing architecture with a wide range of applications. More and more organizations or applications require dynamic management. To address the fine-grained access control problem in cloud environments, Sahai and Waters proposed Attribute-Based Encryption (ABE), where user identity is determined by its attributes. ABE is used in a one-to-many encryption situation, where data is encrypted according to an access policy related to an attribute and can be decrypted by any user whose attributes satisfy the access policy. The ABE scheme with only one authorization center has the problem of excessive concentration of power and will reduce the security. In order to avoid this problem, the mult...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L67/1097
CPCH04L9/0861H04L67/1097
Inventor 李继国张亦辰胡声洲
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products