Book resource access control method based on ciphertext attribute authentication and threshold function

A resource access and control method technology, which is applied in the field of book resource access control based on ciphertext attribute authentication and threshold function, can solve the problems of reducing computing and communication overhead, easily revealing personal identity information, and high information sensitivity, so as to reduce computing and communication overhead, the effect of avoiding collusion attacks

Active Publication Date: 2020-03-24
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problem that in the identity authentication process of the existing information encryption access method, personal identity information is easily exposed, and the information sensitivity is high, and the access authority of the terminal members in the domain cannot be determined, the present invention proposes a method based on ciphertext attribute authentication and The book resource access control method of the threshold function uses the identity authentication technology of hidden attributes to realize personal privacy protection in the identity authentication process of resource information sharing, and uses the threshold function to divide the access rights technology to reduce the calculation and communication costs of each participant. Joint authentication of identity and authority is adopted to avoid collusion attacks by terminals without authority

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Book resource access control method based on ciphertext attribute authentication and threshold function
  • Book resource access control method based on ciphertext attribute authentication and threshold function
  • Book resource access control method based on ciphertext attribute authentication and threshold function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] In the case of complex information sharing, the authentication center in the domain needs to authenticate the identity of the information sharing members, but when providing identity information, the identity information is easily leaked or stolen. For security reasons, while information sharing is multi-party authentication, personal identity privacy needs to be protected. When sharing information, it is also necessary to ensure the confidentiality, integrity and anti-disclosure of communication information, and only authorized members can share information. Aiming at this application background, the present invention proposes a book resource access control method based on ciphertext attribute authentication and threshold function, such as figure 1As shown, the steps are as follows: ① The terminal members participating in the sharing of information resources first perform parameter initialization and generate their own public / private key pairs respectively; Terminal m...

Embodiment 2

[0090] A book resource access control method based on ciphertext attribute authentication and threshold function, such as figure 1 As shown, in order to illustrate the content and implementation method of the present invention, a specific embodiment is provided. In this embodiment, for the convenience of example description, the maximum number of terminal members participating in information resource sharing is 10, and the entity set of terminal members is expressed as The set of corresponding entity terminal memberships is expressed as The authentication center CA defines the attribute set of all terminal members as Attr={A 1 ,A 2}, terminal member u i The attribute set of (1≤i≤10) is attr i ={a i,1 ,a i,2 ,a i,3}. The purpose of introducing details in this embodiment is not to limit the scope of the claims, but to help the understanding of the implementation method of the present invention. Those skilled in the art should understand that various modifications, cha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a book resource access control method based on ciphertext attribute authentication and a threshold function. The book resource access control method comprises the following steps that an authentication center and terminal members generate respective public / private key pairs; the terminal members interact with the authentication center to perform attribute authentication to obtain permission level values, and each terminal member sends the public key and the permission level value to the authentication center, and sends the public key and the permission level value to thecloud service platform after verification; the terminal member calculates an encryption key and a decryption key, encrypts the shared resource information into a ciphertext and uploads the ciphertextto the cloud service platform; and the terminal member determines a ciphertext resource to be checked according to the ciphertext, the cloud service platform verifies the identity of the ciphertext resource and opens an access link of the ciphertext resource, and the terminal member downloads the ciphertext for decryption. Personal privacy is protected by adopting a ciphertext attribute authentication technology, access permission is controlled by setting a threshold function to guarantee the safety of resource sharing, and collusion attack is prevented by adopting identity and permission dual authentication, so that information resource sharing in the Internet of Things is more flexible, efficient and practical.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a book resource access control method based on ciphertext attribute authentication and a threshold function. Background technique [0002] The development of the Internet of Things has led to the great development of data sharing and data interaction, making security and privacy more and more concerned by users. How to ensure the safe sharing of data, avoid the leakage of sensitive information, and protect the privacy of users is a severe challenge. Access control is an important guarantee to ensure the trust of the Internet of Things. The threshold function is set to divide access rights, and users with different rights can access information with different sensitivity levels, which avoids the leakage of sensitive information and realizes fine-grained, flexible and safe access to cloud server data. [0003] The library is a complex and numerous information library....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/30H04L29/08
CPCH04L9/3026H04L9/3066H04L63/0442H04L63/0876H04L63/102H04L63/105H04L67/1097
Inventor 江涛王锐芳李永娇袁俊岭李健勇甘勇张启坤
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products