CN105743642B - 一种抗密钥连续辅助输入泄漏的基于属性加密方法 - Google Patents
一种抗密钥连续辅助输入泄漏的基于属性加密方法 Download PDFInfo
- Publication number
- CN105743642B CN105743642B CN201610266492.8A CN201610266492A CN105743642B CN 105743642 B CN105743642 B CN 105743642B CN 201610266492 A CN201610266492 A CN 201610266492A CN 105743642 B CN105743642 B CN 105743642B
- Authority
- CN
- China
- Prior art keywords
- parameter
- private key
- key
- attribute
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 239000013598 vector Substances 0.000 claims abstract description 57
- 238000004422 calculation algorithm Methods 0.000 claims description 19
- 239000011159 matrix material Substances 0.000 claims description 15
- 238000004364 calculation method Methods 0.000 claims description 13
- 238000013507 mapping Methods 0.000 claims description 6
- 230000009471 action Effects 0.000 claims description 2
- 230000008901 benefit Effects 0.000 description 18
- 230000006870 function Effects 0.000 description 17
- 230000007246 mechanism Effects 0.000 description 12
- 230000002829 reductive effect Effects 0.000 description 5
- 238000004088 simulation Methods 0.000 description 4
- 239000002184 metal Substances 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000003044 adaptive effect Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 238000011217 control strategy Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000000670 limiting effect Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 241000764238 Isis Species 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 238000012905 input function Methods 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 230000003902 lesion Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000036961 partial effect Effects 0.000 description 1
- XOFYZVNMUHMLCC-ZPOLXVRWSA-N prednisone Chemical compound O=C1C=C[C@]2(C)[C@H]3C(=O)C[C@](C)([C@@](CC4)(O)C(=O)CO)[C@@H]4[C@@H]3CCC2=C1 XOFYZVNMUHMLCC-ZPOLXVRWSA-N 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000003643 water by type Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610266492.8A CN105743642B (zh) | 2016-04-26 | 2016-04-26 | 一种抗密钥连续辅助输入泄漏的基于属性加密方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610266492.8A CN105743642B (zh) | 2016-04-26 | 2016-04-26 | 一种抗密钥连续辅助输入泄漏的基于属性加密方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105743642A CN105743642A (zh) | 2016-07-06 |
CN105743642B true CN105743642B (zh) | 2018-08-14 |
Family
ID=56285579
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610266492.8A Active CN105743642B (zh) | 2016-04-26 | 2016-04-26 | 一种抗密钥连续辅助输入泄漏的基于属性加密方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105743642B (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106878322B (zh) * | 2017-03-10 | 2019-06-07 | 北京科技大学 | 一种基于属性的定长密文与密钥的加密、解密方法 |
CN106790312A (zh) * | 2017-03-31 | 2017-05-31 | 山东超越数控电子有限公司 | 一种基于abe的云存储数据安全共享实现方法 |
CN109214160A (zh) * | 2018-09-14 | 2019-01-15 | 温州科技职业学院 | 一种计算机网络身份验证系统及方法、计算机程序 |
CN109474425B (zh) * | 2018-12-25 | 2021-06-25 | 国科量子通信网络有限公司 | 一种基于多个共享密钥获得任意指定长度派生密钥的方法 |
-
2016
- 2016-04-26 CN CN201610266492.8A patent/CN105743642B/zh active Active
Non-Patent Citations (3)
Title |
---|
Attribute-based Encryption Leakage Resilient to Auxiliary Input;Zhiwei Wang,;《international conference on provable security》;20151002;全文 * |
identity-based encryption resilient to continual auxiliary leakage;TH Yuen,SSM Chow,Y Zhang,SM Yiu;《international conference on theory & applications of cryptographic techniques》;20150430;全文 * |
Overcoming the Hole in the Bucket:Public-Key Cryptography Resilient to Continual Memory Leakage;Zvika Brakerski,Yael Tauman Kalai,Jonathan Katz,Vinod Vaikuntana;《IEEE》;20101231;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN105743642A (zh) | 2016-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Das et al. | Multiauthority CP-ABE-based access control model for IoT-enabled healthcare infrastructure | |
Belguith et al. | Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot | |
Brakerski et al. | Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage | |
Yu et al. | LH-ABSC: A lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT | |
Liu et al. | White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures | |
Katz et al. | Predicate encryption supporting disjunctions, polynomial equations, and inner products | |
JP5562687B2 (ja) | 第1のユーザによって第2のユーザに送信される通信の安全化 | |
Guo et al. | TABE-DAC: Efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain | |
Zu et al. | New ciphertext-policy attribute-based encryption with efficient revocation | |
CN105743642B (zh) | 一种抗密钥连续辅助输入泄漏的基于属性加密方法 | |
Guo et al. | Provably secure certificate-based encryption with leakage resilience | |
Miao et al. | Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud | |
Jarecki et al. | An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol | |
Zhang et al. | Leakage-resilient attribute-based encryption with fast decryption: models, analysis and constructions | |
Lin et al. | Identity-based encryption with equality test and datestamp-based authorization mechanism | |
Wang et al. | Attribute-based equality test over encrypted data without random oracles | |
Zhou et al. | CCA2 secure public‐key encryption scheme tolerating continual leakage attacks | |
Mei et al. | Verifiable identity-based encryption with keyword search for IoT from lattice | |
Zhang et al. | Tolerating sensitive-leakage with larger plaintext-space and higher leakage-rate in privacy-aware Internet-of-Things | |
Zhang et al. | A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing | |
Shen et al. | Secure access control for eHealth data in emergency rescue case based on traceable attribute-based encryption | |
Hu et al. | A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience | |
Rao et al. | Bandwidth-efficient attribute-based key-insulated signatures with message recovery | |
Guo et al. | Certificate‐Based Encryption Resilient to Continual Leakage in the Standard Model | |
Zhang et al. | Multi-key leakage-resilient threshold cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20211213 Address after: 521000 No. 7, 12heng, xianyeqian Second District, stork nest third village, Longhu Town, Chao'an county, Chaozhou City, Guangdong Province Patentee after: Li Junliang Address before: 226000 No. 9 Siyuan Road, Chongchuan District, Nantong City, Jiangsu Province Patentee before: NANTONG University |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220308 Address after: 518052 room 703, T1 office building, Qianhai Kerry business center, Qianwan 1st Road, Nanshan street, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong Patentee after: SHENZHEN HOUSLEY TECHNOLOGY Co.,Ltd. Address before: 521000 No. 7, 12heng, xianyeqian Second District, stork nest third village, Longhu Town, Chao'an county, Chaozhou City, Guangdong Province Patentee before: Li Junliang |
|
TR01 | Transfer of patent right |