CN105323212A - Attribute-based encryption technology of safety outsource - Google Patents
Attribute-based encryption technology of safety outsource Download PDFInfo
- Publication number
- CN105323212A CN105323212A CN201410259959.7A CN201410259959A CN105323212A CN 105323212 A CN105323212 A CN 105323212A CN 201410259959 A CN201410259959 A CN 201410259959A CN 105323212 A CN105323212 A CN 105323212A
- Authority
- CN
- China
- Prior art keywords
- attribute
- encryption technology
- based encryption
- key generation
- outsource
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to an attribute-based encryption technology of safety outsource. The attribute-based encryption technology comprises the steps of (1) system establishment, (2) outsource key generation initiation, (3) external key generation, (4) internal key generation, (5) conversion key blinding, (6) encryption, (7) partly decryption, and (8) complete decryption. The attribute-based encryption technology has the advantages of simple implement process and high transmission rate, the attribute-based encryption technology can be used for realizing the resource access control of fine grains under a cloud calculation environment, and a lot of overhead is saved for an attribute authority and a user.
Description
Technical field
The present invention relates to a kind of encryption technology, particularly relate to a kind of encryption technology based on attribute of safe outsourcing.
Background technology
In the last few years, along with the development of network, the rises of appearing vividly such as social networks, ecommerce, digital city and Online Video.These emerging technology need the support of large storage and high-performance server, but need a large amount of manpowers and expensive material resources to the maintenance of this server.Future addresses this problem, and the computer network giants such as GOOGLE, Amazon in 2006, put forward the conception of cloud computing.Cloud computing, as a great innovation of information industry, has more and more received approval and the extensive concern of society and academic all circles.But the problem of thing followed information security hidden danger and the requirement of the high operating load ability of server also be can not be ignored.
Summary of the invention
The object of the present invention is to provide that a kind of implementation process is simple, efficiency of transmission is high, can be used for realizing cloud computing environment under fine-grained resources accessing control, save the encryption technology based on attribute of the safe outsourcing of a large amount of expense for attribute authority (aa) mechanism and user.
Technical scheme of the present invention is: comprise the steps:
1) system establishment step;
2) outsourcing secret generating initialization step;
3) external key generation step;
4) internal key generation step;
5) transition key blinds step;
6) encrypting step;
7) part decryption step;
8) complete decryption step.
The invention process process is simple, efficiency of transmission is high, can be used for realizing cloud computing environment under fine-grained resources accessing control, for attribute authority (aa) mechanism and user save a large amount of expense.
Embodiment
The encryption technology based on attribute of safe outsourcing, comprises the steps:
1) system establishment step;
2) outsourcing secret generating initialization step;
3) external key generation step;
4) internal key generation step;
5) transition key blinds step;
6) encrypting step;
7) part decryption step;
8) complete decryption step.
Claims (1)
1. the encryption technology based on attribute of safe outsourcing, is characterized in that: comprise the steps:
1) system establishment step;
2) outsourcing secret generating initialization step;
3) external key generation step;
4) internal key generation step;
5) transition key blinds step;
6) encrypting step;
7) part decryption step;
8) complete decryption step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410259959.7A CN105323212A (en) | 2014-06-12 | 2014-06-12 | Attribute-based encryption technology of safety outsource |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410259959.7A CN105323212A (en) | 2014-06-12 | 2014-06-12 | Attribute-based encryption technology of safety outsource |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105323212A true CN105323212A (en) | 2016-02-10 |
Family
ID=55249817
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410259959.7A Pending CN105323212A (en) | 2014-06-12 | 2014-06-12 | Attribute-based encryption technology of safety outsource |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105323212A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106875362A (en) * | 2017-02-20 | 2017-06-20 | 上海海洋大学 | A kind of safely outsourced denoising method of remote sensing images |
CN107194895A (en) * | 2017-05-27 | 2017-09-22 | 上海海洋大学 | A kind of safely outsourced fusion denoising method for multiframe remote sensing images |
-
2014
- 2014-06-12 CN CN201410259959.7A patent/CN105323212A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106875362A (en) * | 2017-02-20 | 2017-06-20 | 上海海洋大学 | A kind of safely outsourced denoising method of remote sensing images |
CN106875362B (en) * | 2017-02-20 | 2020-04-10 | 上海海洋大学 | Safe outsourcing denoising method for remote sensing image |
CN107194895A (en) * | 2017-05-27 | 2017-09-22 | 上海海洋大学 | A kind of safely outsourced fusion denoising method for multiframe remote sensing images |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016060722A3 (en) | Homomorphic encryption in a healthcare network environment, system and methods | |
WO2017019201A3 (en) | Cryptographic assurances of data integrity for data crossing trust boundaries | |
GB2544672A (en) | PUF and address dependent data encryption | |
WO2015157693A3 (en) | System and method for an efficient authentication and key exchange protocol | |
GB2560861A8 (en) | Labeling computing objects for improved threat detection | |
CN105320896A (en) | Cloud storage encryption and ciphertext retrieval methods and systems | |
EP3694143A3 (en) | Enabling access to data | |
CN105100115A (en) | Data storage method for privacy protection based on encryption password and data fractionation | |
MX2019015077A (en) | Entrusted login method, related device and computer readable storage medium. | |
MX2019014524A (en) | Data transmission method, network device, and terminal device. | |
CN105100248A (en) | Cloud storage security realization method based on data encryption and access control | |
MX2020010216A (en) | Method for switching between network elements and network element selection, user equipment, network element. | |
CN105323212A (en) | Attribute-based encryption technology of safety outsource | |
MY170681A (en) | System and method for distributed secure data storage in torus network topology | |
CN107172072A (en) | A kind of IPSec data flow high speeds processing system and method based on FPGA | |
CN106789891A (en) | A kind of various dimensions software authorization control method suitable for IaaS cloud platform | |
CN105681027A (en) | HSM encrypted information synchronization method, device and system | |
IN2013CH00917A (en) | ||
CN105224853A (en) | Based on the file encryption-decryption technology of hardware encipher equipment | |
CN204258856U (en) | A kind of secure cloud standby system | |
CN105282186A (en) | Mobile cloud storage system and mobile cloud storage implementation technology | |
CN203951498U (en) | A kind of calculating debug system based on cloud computing heterogeneous platform | |
CN105323268A (en) | Computation debugging system based on cloud computing heterogeneous platform | |
CN105282185A (en) | Network load balance data processing method for cloud computing | |
CN106131096A (en) | Data under a kind of cloud computing environment process the method for secure access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160210 |