CN105743642A - 一种抗密钥连续辅助输入泄漏的基于属性加密方法 - Google Patents
一种抗密钥连续辅助输入泄漏的基于属性加密方法 Download PDFInfo
- Publication number
- CN105743642A CN105743642A CN201610266492.8A CN201610266492A CN105743642A CN 105743642 A CN105743642 A CN 105743642A CN 201610266492 A CN201610266492 A CN 201610266492A CN 105743642 A CN105743642 A CN 105743642A
- Authority
- CN
- China
- Prior art keywords
- key
- attribute
- private key
- user
- select
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 239000013598 vector Substances 0.000 claims abstract description 58
- 238000004422 calculation algorithm Methods 0.000 claims description 19
- 239000011159 matrix material Substances 0.000 claims description 15
- 238000004364 calculation method Methods 0.000 claims description 11
- 125000004122 cyclic group Chemical group 0.000 claims description 3
- 238000013507 mapping Methods 0.000 claims description 3
- 230000036961 partial effect Effects 0.000 claims description 2
- 230000008901 benefit Effects 0.000 description 23
- 230000006870 function Effects 0.000 description 21
- 230000007246 mechanism Effects 0.000 description 12
- 230000008569 process Effects 0.000 description 6
- 239000002131 composite material Substances 0.000 description 5
- 230000003044 adaptive effect Effects 0.000 description 3
- 238000010276 construction Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000002372 labelling Methods 0.000 description 2
- 230000000670 limiting effect Effects 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 238000012905 input function Methods 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
- 230000017105 transposition Effects 0.000 description 1
- 239000003643 water by type Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610266492.8A CN105743642B (zh) | 2016-04-26 | 2016-04-26 | 一种抗密钥连续辅助输入泄漏的基于属性加密方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610266492.8A CN105743642B (zh) | 2016-04-26 | 2016-04-26 | 一种抗密钥连续辅助输入泄漏的基于属性加密方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105743642A true CN105743642A (zh) | 2016-07-06 |
CN105743642B CN105743642B (zh) | 2018-08-14 |
Family
ID=56285579
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610266492.8A Expired - Fee Related CN105743642B (zh) | 2016-04-26 | 2016-04-26 | 一种抗密钥连续辅助输入泄漏的基于属性加密方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105743642B (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790312A (zh) * | 2017-03-31 | 2017-05-31 | 山东超越数控电子有限公司 | 一种基于abe的云存储数据安全共享实现方法 |
CN106878322A (zh) * | 2017-03-10 | 2017-06-20 | 北京科技大学 | 一种基于属性的定长密文与密钥的加密、解密方法 |
CN109214160A (zh) * | 2018-09-14 | 2019-01-15 | 温州科技职业学院 | 一种计算机网络身份验证系统及方法、计算机程序 |
CN109474425A (zh) * | 2018-12-25 | 2019-03-15 | 国科量子通信网络有限公司 | 一种基于多个共享密钥获得任意指定长度派生密钥的方法 |
-
2016
- 2016-04-26 CN CN201610266492.8A patent/CN105743642B/zh not_active Expired - Fee Related
Non-Patent Citations (3)
Title |
---|
TH YUEN,SSM CHOW,Y ZHANG,SM YIU: "identity-based encryption resilient to continual auxiliary leakage", 《INTERNATIONAL CONFERENCE ON THEORY & APPLICATIONS OF CRYPTOGRAPHIC TECHNIQUES》 * |
ZHIWEI WANG,: "Attribute-based Encryption Leakage Resilient to Auxiliary Input", 《INTERNATIONAL CONFERENCE ON PROVABLE SECURITY》 * |
ZVIKA BRAKERSKI,YAEL TAUMAN KALAI,JONATHAN KATZ,VINOD VAIKUNTANA: "Overcoming the Hole in the Bucket:Public-Key Cryptography Resilient to Continual Memory Leakage", 《IEEE》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106878322A (zh) * | 2017-03-10 | 2017-06-20 | 北京科技大学 | 一种基于属性的定长密文与密钥的加密、解密方法 |
CN106878322B (zh) * | 2017-03-10 | 2019-06-07 | 北京科技大学 | 一种基于属性的定长密文与密钥的加密、解密方法 |
CN106790312A (zh) * | 2017-03-31 | 2017-05-31 | 山东超越数控电子有限公司 | 一种基于abe的云存储数据安全共享实现方法 |
CN109214160A (zh) * | 2018-09-14 | 2019-01-15 | 温州科技职业学院 | 一种计算机网络身份验证系统及方法、计算机程序 |
CN109474425A (zh) * | 2018-12-25 | 2019-03-15 | 国科量子通信网络有限公司 | 一种基于多个共享密钥获得任意指定长度派生密钥的方法 |
CN109474425B (zh) * | 2018-12-25 | 2021-06-25 | 国科量子通信网络有限公司 | 一种基于多个共享密钥获得任意指定长度派生密钥的方法 |
Also Published As
Publication number | Publication date |
---|---|
CN105743642B (zh) | 2018-08-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nick et al. | MuSig-DN: Schnorr multi-signatures with verifiably deterministic nonces | |
Lewko et al. | Achieving leakage resilience through dual system encryption | |
Castiglione et al. | Hierarchical and shared access control | |
Halevi et al. | After-the-fact leakage in public-key encryption | |
Chow et al. | Practical leakage-resilient identity-based encryption from simple assumptions | |
Alperin-Sheriff et al. | Circular and KDM security for identity-based encryption | |
Dodis et al. | Storing secrets on continually leaky devices | |
Kalai et al. | Cryptography with tamperable and leaky memory | |
Yuen et al. | Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks | |
Han et al. | PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption | |
Agrawal et al. | On continual leakage of discrete log representations | |
Debnath et al. | Secure and efficient multiparty private set intersection cardinality | |
Li et al. | Puncturable signatures and applications in proof-of-stake blockchain protocols | |
Ruan et al. | After-the-fact leakage-resilient identity-based authenticated key exchange | |
Zhang et al. | Leakage-resilient attribute-based encryption with fast decryption: models, analysis and constructions | |
CN105743642B (zh) | 一种抗密钥连续辅助输入泄漏的基于属性加密方法 | |
Jin et al. | Fully secure hidden ciphertext policy attribute-based encryption with short ciphertext size | |
Liu et al. | Time-controlled hierarchical multikeyword search over encrypted data in cloud-assisted IoT | |
Zhou et al. | CCA2 secure public‐key encryption scheme tolerating continual leakage attacks | |
Chandran et al. | Functional encryption: Decentralised and delegatable | |
Chow | New privacy-preserving architectures for identity-/attribute-based encryption | |
Zhang et al. | Tolerating sensitive-leakage with larger plaintext-space and higher leakage-rate in privacy-aware Internet-of-Things | |
Hu et al. | Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application | |
Gennaro et al. | Automata evaluation and text search protocols with simulation based security | |
Chakraborty et al. | Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20211213 Address after: 521000 No. 7, 12heng, xianyeqian Second District, stork nest third village, Longhu Town, Chao'an county, Chaozhou City, Guangdong Province Patentee after: Li Junliang Address before: 226000 No. 9 Siyuan Road, Chongchuan District, Nantong City, Jiangsu Province Patentee before: NANTONG University |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220308 Address after: 518052 room 703, T1 office building, Qianhai Kerry business center, Qianwan 1st Road, Nanshan street, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong Patentee after: SHENZHEN HOUSLEY TECHNOLOGY Co.,Ltd. Address before: 521000 No. 7, 12heng, xianyeqian Second District, stork nest third village, Longhu Town, Chao'an county, Chaozhou City, Guangdong Province Patentee before: Li Junliang |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180814 |