CN105323212A - Attribute-based encryption technology of safety outsource - Google Patents

Attribute-based encryption technology of safety outsource Download PDF

Info

Publication number
CN105323212A
CN105323212A CN201410259959.7A CN201410259959A CN105323212A CN 105323212 A CN105323212 A CN 105323212A CN 201410259959 A CN201410259959 A CN 201410259959A CN 105323212 A CN105323212 A CN 105323212A
Authority
CN
China
Prior art keywords
attribute
encryption technology
based encryption
key generation
outsource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410259959.7A
Other languages
Chinese (zh)
Inventor
马庆鸣
陈浩
习梦得
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU ZHENYUN COMPUTING TECHNOLOGY Co Ltd
Original Assignee
JIANGSU ZHENYUN COMPUTING TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU ZHENYUN COMPUTING TECHNOLOGY Co Ltd filed Critical JIANGSU ZHENYUN COMPUTING TECHNOLOGY Co Ltd
Priority to CN201410259959.7A priority Critical patent/CN105323212A/en
Publication of CN105323212A publication Critical patent/CN105323212A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to an attribute-based encryption technology of safety outsource. The attribute-based encryption technology comprises the steps of (1) system establishment, (2) outsource key generation initiation, (3) external key generation, (4) internal key generation, (5) conversion key blinding, (6) encryption, (7) partly decryption, and (8) complete decryption. The attribute-based encryption technology has the advantages of simple implement process and high transmission rate, the attribute-based encryption technology can be used for realizing the resource access control of fine grains under a cloud calculation environment, and a lot of overhead is saved for an attribute authority and a user.

Description

A kind of encryption technology based on attribute of safe outsourcing
Technical field
The present invention relates to a kind of encryption technology, particularly relate to a kind of encryption technology based on attribute of safe outsourcing.
Background technology
In the last few years, along with the development of network, the rises of appearing vividly such as social networks, ecommerce, digital city and Online Video.These emerging technology need the support of large storage and high-performance server, but need a large amount of manpowers and expensive material resources to the maintenance of this server.Future addresses this problem, and the computer network giants such as GOOGLE, Amazon in 2006, put forward the conception of cloud computing.Cloud computing, as a great innovation of information industry, has more and more received approval and the extensive concern of society and academic all circles.But the problem of thing followed information security hidden danger and the requirement of the high operating load ability of server also be can not be ignored.
Summary of the invention
The object of the present invention is to provide that a kind of implementation process is simple, efficiency of transmission is high, can be used for realizing cloud computing environment under fine-grained resources accessing control, save the encryption technology based on attribute of the safe outsourcing of a large amount of expense for attribute authority (aa) mechanism and user.
Technical scheme of the present invention is: comprise the steps:
1) system establishment step;
2) outsourcing secret generating initialization step;
3) external key generation step;
4) internal key generation step;
5) transition key blinds step;
6) encrypting step;
7) part decryption step;
8) complete decryption step.
The invention process process is simple, efficiency of transmission is high, can be used for realizing cloud computing environment under fine-grained resources accessing control, for attribute authority (aa) mechanism and user save a large amount of expense.
Embodiment
The encryption technology based on attribute of safe outsourcing, comprises the steps:
1) system establishment step;
2) outsourcing secret generating initialization step;
3) external key generation step;
4) internal key generation step;
5) transition key blinds step;
6) encrypting step;
7) part decryption step;
8) complete decryption step.

Claims (1)

1. the encryption technology based on attribute of safe outsourcing, is characterized in that: comprise the steps:
1) system establishment step;
2) outsourcing secret generating initialization step;
3) external key generation step;
4) internal key generation step;
5) transition key blinds step;
6) encrypting step;
7) part decryption step;
8) complete decryption step.
CN201410259959.7A 2014-06-12 2014-06-12 Attribute-based encryption technology of safety outsource Pending CN105323212A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410259959.7A CN105323212A (en) 2014-06-12 2014-06-12 Attribute-based encryption technology of safety outsource

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410259959.7A CN105323212A (en) 2014-06-12 2014-06-12 Attribute-based encryption technology of safety outsource

Publications (1)

Publication Number Publication Date
CN105323212A true CN105323212A (en) 2016-02-10

Family

ID=55249817

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410259959.7A Pending CN105323212A (en) 2014-06-12 2014-06-12 Attribute-based encryption technology of safety outsource

Country Status (1)

Country Link
CN (1) CN105323212A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106875362A (en) * 2017-02-20 2017-06-20 上海海洋大学 A kind of safely outsourced denoising method of remote sensing images
CN107194895A (en) * 2017-05-27 2017-09-22 上海海洋大学 A kind of safely outsourced fusion denoising method for multiframe remote sensing images

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106875362A (en) * 2017-02-20 2017-06-20 上海海洋大学 A kind of safely outsourced denoising method of remote sensing images
CN106875362B (en) * 2017-02-20 2020-04-10 上海海洋大学 Safe outsourcing denoising method for remote sensing image
CN107194895A (en) * 2017-05-27 2017-09-22 上海海洋大学 A kind of safely outsourced fusion denoising method for multiframe remote sensing images

Similar Documents

Publication Publication Date Title
WO2016060722A3 (en) Homomorphic encryption in a healthcare network environment, system and methods
WO2017019201A3 (en) Cryptographic assurances of data integrity for data crossing trust boundaries
GB2544672A (en) PUF and address dependent data encryption
WO2015157693A3 (en) System and method for an efficient authentication and key exchange protocol
GB2560861A8 (en) Labeling computing objects for improved threat detection
CN105320896A (en) Cloud storage encryption and ciphertext retrieval methods and systems
EP3694143A3 (en) Enabling access to data
CN105100115A (en) Data storage method for privacy protection based on encryption password and data fractionation
MX2019015077A (en) Entrusted login method, related device and computer readable storage medium.
MX2019014524A (en) Data transmission method, network device, and terminal device.
CN105100248A (en) Cloud storage security realization method based on data encryption and access control
MX2020010216A (en) Method for switching between network elements and network element selection, user equipment, network element.
CN105323212A (en) Attribute-based encryption technology of safety outsource
MY170681A (en) System and method for distributed secure data storage in torus network topology
CN107172072A (en) A kind of IPSec data flow high speeds processing system and method based on FPGA
CN106789891A (en) A kind of various dimensions software authorization control method suitable for IaaS cloud platform
CN105681027A (en) HSM encrypted information synchronization method, device and system
IN2013CH00917A (en)
CN105224853A (en) Based on the file encryption-decryption technology of hardware encipher equipment
CN204258856U (en) A kind of secure cloud standby system
CN105282186A (en) Mobile cloud storage system and mobile cloud storage implementation technology
CN203951498U (en) A kind of calculating debug system based on cloud computing heterogeneous platform
CN105323268A (en) Computation debugging system based on cloud computing heterogeneous platform
CN105282185A (en) Network load balance data processing method for cloud computing
CN106131096A (en) Data under a kind of cloud computing environment process the method for secure access

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160210