Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-authority encryption method and system

A technology of authorization and encryption method, applied in the field of encryption, can solve the problems of high communication cost, inappropriate cloud storage system, lack of scalable features, etc., to improve integrity and security, solve collusion attacks, and improve security Effect

Pending Publication Date: 2020-12-18
FUJIAN NORMAL UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing technology, each authority needs to interact with each other to achieve the same effect as a single central authority, resulting in a system that requires high communication costs and lacks scalability, and is not suitable for complex cloud storage. system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-authority encryption method and system
  • Multi-authority encryption method and system
  • Multi-authority encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] Please refer to figure 1 , Embodiment 1 of the present invention is:

[0079] A multi-authority encryption method, specifically comprising:

[0080] S1. The attribute authority generates the master private key and system public parameters according to the preset algorithm, and the attribute authority (AA) has multiple and is independent of each other;

[0081] Specifically:

[0082] Receive the system security parameter λ, and generate the multiplicative cyclic group G and G of the prime number p whose group order is λ bits T , the length of the prime number p is λ bits, and generates the bilinear group e:G×G→G T , g is a generator of the multiplicative cyclic group G;

[0083] Each attribute authority randomly selects the first random value w and the second random value a k , a k ∈ Z p * Calculate the first indicated value and the second indicated value where k represents the kth attribute authority, Z p * ={1,2,...,p-1};

[0084] selecting a fourth indi...

Embodiment 2

[0117] A multi-authority organization encryption method, which differs from Embodiment 1 in that:

[0118] Also include before the step S5:

[0119] The data holder outputs ciphertext according to the system public parameters, plaintext and access policy set;

[0120] Specifically:

[0121] Select the plaintext m to be encrypted, the access policy set W={W 1 ,W 2 ,...,W n} and a random positive integer s;

[0122] Calculate the ciphertext header C of the ciphertext 0 =g s , ciphertext

[0123] Set the initial value of the root node ε of the access tree to s∈Z N / 0, and mark the number of child nodes ζ;

[0124] Judging the identification relationship between the root node and the child nodes, if it is an "or" operation, setting all the child nodes corresponding to the root node to s;

[0125] If it is an "AND" operation, an integer s is randomly selected i As the value of the i-th child node corresponding to the root node, and the values ​​of all the child nodes c...

Embodiment 3

[0137] Please refer to figure 2 , Embodiment three of the present invention is:

[0138] A multi-authority encryption system, including an attribute authority 4, a data owner 2, and a user terminal 3, the attribute authority 1 includes a first memory 1.2, a first processor 1.1 and stored on the first memory 1.2 The first computer program that can run on the first processor 1.1, the data owner 2 includes a second memory 2.2, a second processor 2.1, and is stored on the second memory 2.2 and can be used in the The second computer program running on the second processor 2.1; the client 3 includes a third memory 3.2, a third processor 3.1 and is stored on the third memory 3.2 and can be run on the third processor 3.1 The running third computer program, when the first processor executes the first computer program, implements the steps implemented by the attribute authority in Embodiment 1 or Embodiment 2;

[0139] When the second processor executes the second computer program, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the multi-authorization mechanism encryption method and system disclosed by the invention, the attribute authorization mechanisms generate the main private key and the system public parameters according to the preset algorithm, and the plurality of attribute authorization mechanisms are mutually independent; the attribute authorization mechanism outputs a private key component to theuser side according to the main private key, the system public parameters and the attribute set; the attribute authorization mechanism receives an attribute updating request, calculates a first updating private key according to the attribute updating request, and sends the first updating private key to the user side; the user side generates a user private key according to the private key assembly,or the user side updates the user private key according to the first updating private key; the user side decrypts the ciphertext according to the user private key; according to the method, the user private key can be automatically updated by the user side when the attribute is revoked, the security of the system is further improved, the attribute re-encryption problem is solved by using the proxyre-encryption technology, and the collusion attack problem is solved.

Description

technical field [0001] The invention relates to the encryption field, in particular to a multi-authorization organization encryption method and system. Background technique [0002] In a large-scale file service system, the service architecture is often distributed; in the existing distributed service system, the system must have the characteristics of ensuring data integrity, high availability, high capacity and scalability. Then, a single central authority often brings stricter security requirements and bottlenecks caused by overly complex computing and storage. Therefore, aiming at the single-point bottleneck problem in the prior art, an ABE (Attribute-Based Encryption) scheme based on multiple authorities is proposed to try to solve the problem of inefficient computing and storage caused by a single server. [0003] The attribute-based encryption system under the multi-authorization organization disperses the authority and workload of the central organization, and impro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/0891H04L9/0819H04L9/002
Inventor 李继国张亦辰周李京朱留富章如愿康曌哲
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products