Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Book resource access control method based on ciphertext attribute authentication and threshold function

A resource access and control method technology, which is applied in the field of book resource access control based on ciphertext attribute authentication and threshold function, can solve the problems of being unable to determine the access rights of terminal members in the domain, easily exposing personal identity information, reducing computing and communication overhead, etc. , to achieve the effect of reducing computing and communication overhead, protecting personal privacy, and lightweight computing and communication

Active Publication Date: 2021-11-30
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problem that in the identity authentication process of the existing information encryption access method, personal identity information is easily exposed, and the information sensitivity is high, and the access authority of the terminal members in the domain cannot be determined, the present invention proposes a method based on ciphertext attribute authentication and The book resource access control method of the threshold function uses the identity authentication technology of hidden attributes to realize personal privacy protection in the identity authentication process of resource information sharing, and uses the threshold function to divide the access rights technology to reduce the calculation and communication costs of each participant. Joint authentication of identity and authority is adopted to avoid collusion attacks by terminals without authority

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Book resource access control method based on ciphertext attribute authentication and threshold function
  • Book resource access control method based on ciphertext attribute authentication and threshold function
  • Book resource access control method based on ciphertext attribute authentication and threshold function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] In the case of complex information sharing, the authentication center in the domain needs to authenticate the identity of the information sharing members, but when providing identity information, the identity information is easily leaked or stolen. For security reasons, while information sharing is multi-party authentication, personal identity privacy needs to be protected. When sharing information, it is also necessary to ensure the confidentiality, integrity and anti-disclosure of communication information, and only authorized members can share information. Aiming at this application background, the present invention proposes a book resource access control method based on ciphertext attribute authentication and threshold function, such as figure 1As shown, the steps are as follows: ① The terminal members participating in the sharing of information resources first perform parameter initialization and generate their own public / private key pairs respectively; Terminal m...

Embodiment 2

[0090] A book resource access control method based on ciphertext attribute authentication and threshold function, such as figure 1 As shown, in order to illustrate the content and implementation method of the present invention, a specific embodiment is provided. In this embodiment, for the convenience of example description, the maximum number of terminal members participating in information resource sharing is 10, and the entity set of terminal members is expressed as The set of corresponding entity terminal memberships is expressed as The authentication center CA defines the attribute set of all terminal members as Attr={A 1 ,A 2}, terminal member u i The attribute set of (1≤i≤10) is attr i ={a i,1 ,a i,2 ,a i,3}. The purpose of introducing details in this embodiment is not to limit the scope of the claims, but to help the understanding of the implementation method of the present invention. Those skilled in the art should understand that various modifications, cha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a book resource access control method based on ciphertext attribute authentication and threshold function. The steps are as follows: the authentication center and terminal members generate their own public / private key pairs; the terminal members interact with the authentication center to perform attribute authentication to obtain authority Level value, each terminal member sends the public key and authority level value to the certification center, and sends it to the cloud service platform after verification; the terminal member calculates the encryption key and decryption key and encrypts the shared resource information into ciphertext and uploads it to the cloud Service platform: terminal members determine the ciphertext resources they want to view according to the ciphertext, the cloud service platform verifies their identities and opens the access link of the ciphertext resources, and terminal members download the ciphertext for decryption. The invention adopts ciphertext attribute authentication technology to protect personal privacy, sets threshold function to control access authority to ensure the security of resource sharing, and adopts double authentication of identity and authority to prevent collusion attacks, making information resource sharing in the Internet of Things more flexible, efficient and practical.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a book resource access control method based on ciphertext attribute authentication and a threshold function. Background technique [0002] The development of the Internet of Things has led to the great development of data sharing and data interaction, making security and privacy more and more concerned by users. How to ensure the safe sharing of data, avoid the leakage of sensitive information, and protect the privacy of users is a severe challenge. Access control is an important guarantee to ensure the trust of the Internet of Things. The threshold function is set to divide access rights, and users with different rights can access information with different sensitivity levels, which avoids the leakage of sensitive information and realizes fine-grained, flexible and safe access to cloud server data. [0003] The library is a complex and numerous information library....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/30H04L29/08
CPCH04L9/3026H04L9/3066H04L63/0442H04L63/0876H04L63/102H04L63/105H04L67/1097
Inventor 江涛王锐芳李永娇袁俊岭李健勇甘勇张启坤
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products