Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control system and method supporting cross-domain data sharing, and wireless communication system

A data sharing and access control technology, applied in wireless communications, digital transmission systems, transmission systems, etc., can solve problems such as difficult application, different identification, data access control, etc., to avoid collusion attacks, improve decryption efficiency, and computing power. strong effect

Active Publication Date: 2022-04-05
XIDIAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the existing solutions still have not completely solved how to use attribute-based encryption to realize cross-domain data sharing and access control; (1) different management strategies are used between different domains, that is, the same identity is identified differently between different domains, How to complete identity authentication between different domains is a technical problem
(2) On the premise of realizing cross-domain data sharing, how to realize one-to-many data sharing and how to share data to a specific group is a technical problem
(3) In attribute-based encryption, different users may share attribute private keys and decrypt ciphertexts in the form of collusion. How to resist collusion attacks is a technical problem
(4) Using attribute-based encryption, due to the use of bilinear pairings, the user's decryption efficiency is low. How to improve the user's decryption efficiency is a difficult problem
[0007] (1) The existing solution uses different management strategies between different domains, that is, the same identity is marked differently between different domains, resulting in difficulties in cross-domain authentication
[0008] (2) On the premise of achieving cross-domain data sharing, the existing solutions cannot realize one-to-many and data sharing for specific groups
[0009] (3) In the existing scheme of attribute-based encryption, different users may share the attribute private key, so that unauthorized users can also decrypt the ciphertext by means of collusion
[0010] (4) The existing scheme uses attribute-based encryption, and due to the use of bilinear pairing, the user's decryption efficiency is low
[0011] Difficulty in solving the above technical problems: (1) The technical bottleneck of cross-domain data sharing mainly lies in the identity authentication between different domains, which is an important reason for the difficulty in implementing cross-domain sharing technology
(2) How to perform one-to-many sharing of cross-domain data and how to control data access are also important reasons why cross-domain sharing cannot be used flexibly
(3) Due to the use of bilinear pairing, attribute-based encryption leads to extremely low user decryption efficiency, which is an important reason for its difficulty in practical application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control system and method supporting cross-domain data sharing, and wireless communication system
  • Access control system and method supporting cross-domain data sharing, and wireless communication system
  • Access control system and method supporting cross-domain data sharing, and wireless communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0073] Aiming at the problems existing in the prior art, the present invention provides an access control system and method supporting cross-domain data sharing, and a wireless communication system. The present invention will be described in detail below with reference to the accompanying drawings.

[0074] like figure 1 As shown, the embodiment of the present invention provides an access control system supporting cross-domain data sharing including:

[0075] Domain A user initialization module 1, used to realize the generation of the user's ECC public key / private key pair;

[0076] Domain B initialization module 2 is use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of wireless communication networks, and discloses an access control system and method supporting cross-domain data sharing, and a wireless communication system. Users in domain A who need to share data select elliptic curve parameters to generate ECC key pairs; domain B The global certification center CA of the global certification center CA generates global public parameters; the proxy node in domain B uses the ECC public key of domain A user to encrypt the system public key and attribute set; domain A user uses its own ECC private key to decrypt the data from domain B, upload to the public cloud; the legitimate user sends a file access request to the public cloud; when the user revokes, the proxy server will search for the corresponding attribute private key list according to the user's global identifier and delete it. The present invention has high security under the condition of equal key length. Give full play to the characteristics of strong computing power of proxy nodes, complete some data preprocessing work, and help users partially decrypt, improving user decryption efficiency.

Description

technical field [0001] The invention belongs to the technical field of wireless communication networks, and in particular relates to an access control system and method supporting cross-domain data sharing, and a wireless communication system. Background technique [0002] For the security and unified management of network resources, computer networks are always divided into many independent autonomous management domains. In different domains, users and resources are managed using different policies. For example, all governments, banks, and social networks have their own management and service systems, which are called a management domain. With the rapid development of information technology, users' demand for data sharing is gradually increasing. Data sharing in a single domain can no longer meet the needs of users, and the data needed by a certain user may be in another management domain. For example, a WeChat user wants to share data with QQ users, and at the same time...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/03H04W12/041H04W12/06H04L9/30
CPCH04W12/06H04W12/02H04L9/3066H04W12/03
Inventor 樊凯潘强白宇晗刘婷婷李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products