SM9-based key policy attribute-based encryption method

An attribute-based encryption and policy technology, which is applied in the field of information security, can solve the problems of inability to realize fine-grained access control of data, and achieve high efficiency, strong security, and the effect of protecting information security

Active Publication Date: 2022-02-11
FUJIAN NORMAL UNIV
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an SM9-based key policy attribute-based encryption method to solve the problem of fine-grained access control to data that cannot be realized by the SM9 identification encryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM9-based key policy attribute-based encryption method
  • SM9-based key policy attribute-based encryption method
  • SM9-based key policy attribute-based encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0060] Such as Figure 1 to Figure 3 As shown in one of the above, the most critical idea of ​​the present invention is: combining the SM9 identification encryption algorithm, representing the user's identification as a set of descriptive attributes, by associating the user's key with the access control tree, the encrypted ciphertext and properties for fine-grained access control of encrypted data.

[0061] Please refer to figure 1 , a SM9-based key policy attribute-based encryption method, which comprises steps:

[0062] S1. The key generation center generates system parameters according to the SM9 algorithm, and discloses the generated system parameters...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SM9-based key policy attribute-based encryption method. The method comprises the following steps that: S1, a key generation center generates system parameters according to an SM9 algorithm, and discloses the generated system parameters to users in a system; S2, the key generation center generates a main public key and a private key of the system according to the attribute space of the users, the main public key is published to the users in the system, and the main private key is stored; S3, an encryptor generates a ciphertext about a to-be-encrypted message under an attribute set according to the attribute set and the to-be-encrypted message; S4, the key generation center generates a decryption key corresponding to an access control tree according to the access tree and the main private key of the system; and S5, after a receiver obtains the ciphertext, when the attribute set corresponding to the ciphertext meets the access control tree corresponding to the key, the message is decrypted to be recovered, otherwise, the decryption fails. According to the method, the attribute is used as the public key, the ciphertext is associated with the attribute, and the secret key is associated with the access control tree, so that the purpose of flexibly representing an access control strategy is achieved, and the processing overhead of the network bandwidth and the sending node caused by data sharing and fine-grained access control is greatly reduced.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an SM9-based key policy attribute-based encryption method. Background technique [0002] The development of blockchain has received extensive attention in recent years, and its integrated applications have been extended to many fields such as digital finance, Internet of Things, intelligent manufacturing, supply chain management, and digital asset transactions. The flexibility of access control of encrypted data puts forward higher requirements, and the access control provided by traditional encryption mechanisms can no longer meet the growing actual needs of people. In order to achieve fine-grained access control of encrypted data, Sahai and Waters in In 2005, the concept of Attribute-Based Encryption (ABE) was proposed. [0003] Attribute-based encryption is divided into ciphertext policy attribute-based encryption and key policy attribute-based encryption. Cipher...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08H04L9/06
CPCH04L9/3073H04L9/0869H04L9/0643
Inventor 黄欣沂刘晓红伍玮何德彪
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products