CN105871551A - User access cancelling control method based on agent re-encryption - Google Patents

User access cancelling control method based on agent re-encryption Download PDF

Info

Publication number
CN105871551A
CN105871551A CN201610456710.4A CN201610456710A CN105871551A CN 105871551 A CN105871551 A CN 105871551A CN 201610456710 A CN201610456710 A CN 201610456710A CN 105871551 A CN105871551 A CN 105871551A
Authority
CN
China
Prior art keywords
user
key
attribute
ciphertext
updating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610456710.4A
Other languages
Chinese (zh)
Other versions
CN105871551B (en
Inventor
刘化胜
杨接
庞立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Dina Digital Technology Co Ltd
Original Assignee
Jiangsu Dina Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Dina Digital Technology Co Ltd filed Critical Jiangsu Dina Digital Technology Co Ltd
Priority to CN201610456710.4A priority Critical patent/CN105871551B/en
Publication of CN105871551A publication Critical patent/CN105871551A/en
Application granted granted Critical
Publication of CN105871551B publication Critical patent/CN105871551B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Abstract

The invention provides a user access cancelling control method based on agent re-encryption. The user access cancelling control method comprises the following steps: when a user needs to be canceled from a system, generating relevant parameters of key updating by an attribute management mechanism related with user attributes; updating an accessing private key of a non-cancelled user in the system, so as to receive a data access request of the non-cancelled user by the system; sending a secret key for updating an information ciphertext to a cloud service region by the attribute management mechanism and carrying out ciphertext updating on a ciphertext without attributes by a cloud server; and deleting the user and the relevant data from an accessible user list in the system so as to cancel an access authority of the user to the system. According to the user access cancelling control method, only the ciphertext related to the attributes to the cancelled user is updated, without the need of updating all the ciphertexts, so that the communication expenditure of the whole system is reduced, the operation efficiency of the whole system is improved and the safety of the system is also guaranteed.

Description

Access control method is cancelled based on the user acting on behalf of re-encryption
Technical field
The present invention relates to technical field of traffic control, cancel access control particularly to a kind of based on the user acting on behalf of re-encryption Method processed.
Background technology
Access control technology is the security mechanism of a kind of very effective protection data safety, and user is carried out authentication Afterwards, need to carry out authorizing according to user identity to access or denied access.In access control scheme, the change of user is special It is the access problem that produces when cancelling of validated user it is critical that problem.High performance access control scheme shows incessantly Access privilege control to current Lawful user, more shows user to occur during change and remains to realize good access rights control System.As when validated user is cancelled, data content can not be conducted interviews by this user again, and other validated users remain to access certainly Data content in own access rights.
Currently used technology is that the ciphertext of self is encrypted after user cancels by data owner again, it Remaining user rear updates the access private key of oneself, and then obtains the ciphertext after updating, and obtains oneself addressable plaintext originally Data message.But data owner is responsible for all of ciphertext renewal work, the burden of data owner will be increased the weight of, and then reduce number According to the efficiency uploaded.
Summary of the invention
The purpose of the present invention is intended at least solve one of described technological deficiency.
To this end, it is an object of the invention to propose a kind of cancel access control method based on the user acting on behalf of re-encryption, only Update the ciphertext relevant to cancelling user property rather than need not all ciphertexts are all updated, thus reducing whole The communication overhead of individual system, improves the operational efficiency of whole system, has also ensured the safety of system.
To achieve these goals, embodiments of the invention provide a kind of and cancel access control based on the user acting on behalf of re-encryption Method processed, comprises the steps:
Step S1, as user UiWhen cancelling from system, with described user UiAttributeThe Attribute Authority being associated Producing the relevant parameter of key updating, wherein, the relevant parameter of described key updating includes: access private key for updating user KeyWith the key updated for information ciphertext
Step S2, does not cancels the access private key of user in renewal system, so that not cancelling the number of user described in system reception According to access request;
Step S3, described Attribute Authority sends the described key updated for information ciphertext to cloud service districtDescribed Cloud Server according toTo cancelling attributeCiphertext CT carry out ciphertext renewal;
Step S4, deletes described user U in addressable user list in systemsiAnd related data, to cancel State user UiRight to access to system.
Further, in described step S1, comprise the steps:
Step S11, described Attribute Authority is according to self-authentication private key SKn, current version keyWith user Ui's Overall situation PKIGenerate new version keyCalculated version private key is
Step S12, described Attribute Authority utilizesCalculating accesses the key of private key for updating userWith the key updated for information ciphertext
Step S13, described Attribute Authority updates has cancelled attributeAttribute PKI And cancelled attribute to all of data owner broadcastThe update notification of attribute PKI, all of data owner will be from The broadcast of Attribute Authority obtains the attribute PKI after updating
Step S14, described Attribute Authority exportsWith
Further, in described step S2, comprise the steps:
Step S21, described Attribute Authority is to not cancelling user's transmission
Step S22, do not cancel user according toWith current accessed private key SKj,n, calculate the access private key after updating
Further,
Wherein, tj,kIt is ZpIn a random number.
Further, in described step S3,
Step S31, described Attribute Authority sends to Cloud Server
Step S32, described Cloud Server according toCurrently comprise and cancelled attributeCiphertext CT, calculate more Ciphertext CT ' after Xin.
Further,
∀ i ∈ [ 1 , l ] , ρ ( i ) = x ~ n : C i = g aλ i · ( ( g v ρ ( i ) H ( ρ ( i ) ) ) γ k ) - γ i , D 1 , i = g r i β k , D 2 , i = g - γ k β k r i ,
∀ i ∈ [ 1 , l ] , ρ ( i ) ≠ x ~ n , C i = g aλ i · ( ( g v p ( i ) H ( ρ ( i ) ) ) γ k ) - γ i · D 2 , i CTUP x ~ n , D 1 , i ′ = g r i β k , D 2 , i ′ = g - γ k β k r i ) .
According to embodiments of the present invention cancel access control method based on the user acting on behalf of re-encryption, re-encryption skill will be acted on behalf of Art applies to during user cancels, and makes the ciphertext produced when user cancels update operation and gives Cloud Server and run, reduces biography The computing cost of data owner in system scheme.Meanwhile, the present invention only updates the ciphertext relevant to cancelling user property, and not It is to need not all ciphertexts are all updated, thus reduces the communication overhead of whole system, improve the fortune of whole system Line efficiency, has also ensured the safety of system.The present invention is directed to the access control problem produced when user cancels, remove in guarantee Pin user can not access data content, and other unrevoked validated users remain to normally access the number in self access authority range While it is believed that breath, reduce and cancelled the system update expense caused by user.
Aspect and advantage that the present invention adds will part be given in the following description, and part will become from the following description Obtain substantially, or recognized by the practice of the present invention.
Accompanying drawing explanation
Above-mentioned and/or the additional aspect of the present invention and advantage are from combining the accompanying drawings below description to embodiment and will become Substantially with easy to understand, wherein:
Fig. 1 is the flow chart cancelling access control method based on the user acting on behalf of re-encryption according to embodiment.
Detailed description of the invention
Embodiments of the invention are described below in detail, and the example of described embodiment is shown in the drawings, the most from start to finish Same or similar label represents same or similar element or has the element of same or like function.Below with reference to attached The embodiment that figure describes is exemplary, it is intended to is used for explaining the present invention, and is not considered as limiting the invention.
The present invention proposes a kind of to cancel access control method based on the user acting on behalf of re-encryption, and the method uses agency heavily to add Secret skill art realizes cancelling user and not cancelling the access control of user.
Illustrate acting on behalf of Re-encryption Technology first below.
Acting on behalf of Re-encryption Technology is that a kind of key is changed the mechanism, and it is as follows that its technology implements process: first produces conversion Key ω;Secondly the cryptographic operation that information performs is utilized ω to be converted into the PKI using A to utilize B PKI to enter by proxy server OK, such B is by using the private key of self, so that it may information ciphertext is performed decryption oprerations, can obtain required raw information.
Act on behalf of Re-encryption Technology to have the advantage that
(1) during whole, raw information and user A, the private key of B is not exposed to server, and then greatly reduces The possibility of information leakage.
(2) when PKI changes, raw information does not change, and therefore A Yu B enjoys prime information money the most jointly Source.
(3) when the PKI of A or B changes, ω changes, so that A, B still can utilize own private key Obtain original plaintext message.
Act on behalf of Re-encryption Technology according to different classification foundations, different technology subclasses can be produced.Such as: by information ciphertext Encryption number of times, as classification foundation, can be divided into single-hop and multi-hop two kinds by acting on behalf of Re-encryption Technology.Single-hop refers to that ciphertext is whole Only carry out during individual once encrypting;And multi-hop refers to that ciphertext has in use carried out repeatedly encrypting.Utilize ciphertext Encryption direction is different, again by act on behalf of Re-encryption Technology be divided into unidirectional with two-way two kinds.When the conversion direction of ciphertext can only be from one It is referred to as unidirectional proxy re-encryption when side is to the opposing party, and bi-directional proxy re-encryption refers to that ciphertext can be turned round between both sides Change.
The embodiment of the present invention cancel access control method based on the user acting on behalf of re-encryption, when cancelling for user produce Access control problem, cancelled user and can not access data content ensureing, other unrevoked validated users remain to normally While accessing the data message in self access authority range, reduce and cancelled the system update expense caused by user.
As it is shown in figure 1, the embodiment of the present invention cancel access control method based on the user acting on behalf of re-encryption, including as follows Step:
Step S1, as user UiWhen cancelling from system, with user UiAttributeThe Attribute Authority being associated produces The relevant parameter of key updating.
That is, as user UiWhen cancelling from system, its attribute comprisedIt is by Attribute Authority AAnControl.
In one embodiment of the invention, the relevant parameter of key updating includes: access private key for updating user KeyWith the key updated for information ciphertext
Step S11, Attribute Authority is according to self-authentication private key SKn, current version keyWith user UiThe overall situation PKIGenerate new version keyCalculated version private key is
First, Setup (λ) algorithm: Setup (λ) → (SMK, SPK, { uid, GPK is utilizeduid,GSKuid})。
Specifically, the security parameter λ that input is file of Setup (λ) algorithm, structure rank are prime number p, and generating unit is g's Bilinear Groups G0, bilinear map is e:G0×G0→GT.Now, GTThere is bilinearity, nonsingular characteristic.Setup (λ) algorithm Publicly-owned parameter SPK of the system that is output as and system master key SMK.It is the user of uid for identification code, it will produce for this user Overall situation private key GSKuidAnd overall situation PKI GPKuid
Following algorithm is used to calculate certification private key SKn, current version keyDeng, specific as follows:
Attribute Authority AA initialization algorithm is by machine Structure itself performs.With the unique identifier aaid of this AA for input, export AAaaidCertification private key SKaaidWith certification PKI PKaaid, for AAaaidEach attribute of management produces attribute version keyWith attribute PKI
Input is Attribute Authority AAnCertification private key SKn, current version keyAnd UiOverall PKI Then a new version key is producedCalculated version private key is
Step S12, Attribute Authority utilizesCalculating accesses the key of private key for updating userWith the key updated for information ciphertext
Run UKeyGen, utilizeCalculate remaining users Uj(j∈SU, j ≠ i) and the key of (that is, not cancelling user) More new keyWith ciphertext more new key
UKeyGen algorithm is as follows:
Key updating algorithm is by attribute management Mechanism runs, and produces private key undated parameter and the parameter of ciphertext renewal not cancelling user.For the attribute cancelled.Input Private key SK for Attribute Authorityaaid, cancelled attributeVersion keyAnd the overall PKI of other usersIt is output as user key more new keyWith ciphertext more new key
Step S13, Attribute Authority AAnUpdate and cancelled attributeAttribute PKIAnd Attribute has been cancelled to all of data owner broadcastThe update notification of attribute PKI, to notify all of data owner PKI updates.All of data owner is by dependence administrative organization AAnBroadcast in obtain the attribute after updating public Key
Step S14, Attribute Authority exportsWith
Step S2, does not cancels the access private key of user in renewal system, so that system receives the data visit not cancelling user Ask request.
When the attribute of user is cancelled, it is ensured that the user cancelled can not access data, and unrevoked conjunction again Method user remains to access normally data content.User U is not cancelled for remainingj(j∈SU, j ≠ i), its data access will be made to ask Ask unaffected, then need its private key is updated.
Step S21, Attribute Authority accesses the key of private key to not cancelling user's transmission for updating this user
Step S22, do not cancel user according toWith current accessed private key SKj,n, calculate the access private key after updating
In one embodiment of the invention, receivingCall SKUpdate algorithm, input as current accessed private Key SKj,nWith corresponding user key more new keyIt is output as the access private key after updating
Other are not cancelled user and run private key update algorithm. Input is current secret key SKuid,aaidWith user key more new keyBy accessing private after being calculated as its generation renewal Key SKuid,aaid
Access private key after concrete renewalAs follows:
SK j , k = ( K j , k = g α k z j · g au j · g at j , k β k , L j , k = g β k t j , k z j , R j , k = g at j , k , M j , k = g at j , k , ∀ x k ∈ S j , k : K j , x k = g β k γ k t j . k z j · ( g v x k · H ( x k ) ) γ k β k u i d · KUK j , x ~ n , ∀ x k ∈ S U , x k ≠ x ~ n : K j , x k ′ = K j , x k
?Expression formula in tj,kIt is ZpIn a random number.It can be seen that other users only relate to attribute Part update the most accordingly, due to user key more new keyWith the uid of user is correlated with, so cancelled User does not has correspondenceThe renewal of private key of then can not conducting interviews the most just cannot obtain corresponding data content.
Step S3, Attribute Authority sends the key updated for information ciphertext to cloud service districtCloud service Device according toTo cancelling attributeCiphertext CT carry out ciphertext renewal.
Step S31, Attribute Authority AAnCiphertext more new key is sent to Cloud Server
Step S32, Cloud Server according toCurrently comprise and cancelled attributeCiphertext CT, calculate update after Ciphertext CT '.
ReceivingAfter, Cloud Server runs ciphertext update algorithm CTUpdate, inputs and cancels for currently comprising AttributeCiphertext CT and for information ciphertext update keyBy calculating the ciphertext CT ' after renewal, calculate Method is as follows:
Run by cloud service provider.The input of algorithm is current ciphertext CT and close Literary composition more new keyDraw the ciphertext after renewal.
First Z is selectedqIn a random number s as encryption exponent, an and stochastic variable y2,...,ynShare identical encryption exponent s.For any i ∈ (1, l), calculate λi=v Ri, RiIt it is i-th row of matrix R.With Machine selects r1,r2,...,ri∈Zq, as accessing when private key updates, it is only necessary to update to comprise and cancel attributeComponent i.e. Can, the ciphertext CT ' after renewal is as follows:
CT ′ = ( C = κ · ( Π k ∈ I A e ( g , g ) α k ) s , C ′ = g s , C ′ ′ = g s β k , ∀ i ∈ [ 1 , l ] , ρ ( i ) = x ~ n : C i = g aλ i · ( ( g v ρ ( i ) H ( ρ ( i ) ) ) γ k ) - γ i , D 1 , i = g r i β k , D 2 , i = g - γ k β k r i , ∀ i ∈ [ 1 , l ] , ρ ( i ) ≠ x ~ n , C i = g aλ i · ( ( g v p ( i ) H ( ρ ( i ) ) ) γ k ) - γ i · D 2 , i CTUP x ~ n , D 1 , i ′ = g r i β k , D 2 , i ′ = g - γ k β k r i ) .
Step S4, deletes user U in addressable user list in systemsiAnd related data, to cancel user UiRight The right to access of system.
No longer there is the authority accessing data due to the user that cancelled, thus by addressable user list with this user Relevant data deletion, thus directly keep off cancelling user outside validated user list during primary screening user so that it is no longer There is the right accessing data, prevent user from forging self attributes and carry out the illegal acquisition of information.
The cancelling access control method based on the user acting on behalf of re-encryption and can ensure that the use cancelled of the embodiment of the present invention Family can not access data, can not hinder simultaneously and not cancel user accesses data.
According to embodiments of the present invention cancel access control method based on the user acting on behalf of re-encryption, re-encryption skill will be acted on behalf of Art applies to during user cancels, and makes the ciphertext produced when user cancels update operation and gives Cloud Server and run, reduces biography The computing cost of data owner in system scheme.Meanwhile, the present invention only updates the ciphertext relevant to cancelling user property, and not It is to need not all ciphertexts are all updated, thus reduces the communication overhead of whole system, improve the fortune of whole system Line efficiency, has also ensured the safety of system.The present invention is directed to the access control problem produced when user cancels, remove in guarantee Pin user can not access data content, and other unrevoked validated users remain to normally access the number in self access authority range While it is believed that breath, reduce and cancelled the system update expense caused by user.
In the description of this specification, reference term " embodiment ", " some embodiments ", " example ", " specifically show Example " or the description of " some examples " etc. means to combine this embodiment or example describes specific features, structure, material or spy Point is contained at least one embodiment or the example of the present invention.In this manual, to the schematic representation of above-mentioned term not Necessarily refer to identical embodiment or example.And, the specific features of description, structure, material or feature can be any One or more embodiments or example in combine in an appropriate manner.
Although above it has been shown and described that embodiments of the invention, it is to be understood that above-described embodiment is example Property, it is impossible to be interpreted as limitation of the present invention, those of ordinary skill in the art is without departing from the principle of the present invention and objective In the case of above-described embodiment can be changed within the scope of the invention, revise, replace and modification.The scope of the present invention Extremely it is equal to by claims and limits.

Claims (6)

1. cancel access control method based on the user acting on behalf of re-encryption for one kind, it is characterised in that comprise the steps:
Step S1, as user UiWhen cancelling from system, with described user UiAttributeThe Attribute Authority being associated produces The relevant parameter of key updating, wherein, the relevant parameter of described key updating includes: access the key of private key for updating userWith the key updated for information ciphertext
Step S2, does not cancels the access private key of user in renewal system, so that the data not cancelling user described in system reception are visited Ask request;
Step S3, described Attribute Authority sends the described key updated for information ciphertext to cloud service districtInstitute State Cloud Server according toTo cancelling attributeCiphertext CT carry out ciphertext renewal;
Step S4, deletes described user U in addressable user list in systemsiAnd related data, to cancel described user UiRight to access to system.
2. cancel access control method based on the user acting on behalf of re-encryption as claimed in claim 1, it is characterised in that described In step S1, comprise the steps:
Step S11, described Attribute Authority is according to self-authentication private key SKn, current version keyWith user UiThe overall situation public KeyGenerate new version keyCalculated version private key is
Step S12, described Attribute Authority utilizesCalculating accesses the key of private key for updating userWith the key updated for information ciphertext
Step S13, described Attribute Authority updates has cancelled attributeAttribute PKIAnd to Attribute has been cancelled in all of data owner broadcastThe update notification of attribute PKI, all of data owner is by dependence The broadcast of administrative organization obtains the attribute PKI after updating
Step S14, described Attribute Authority exportsWith
3. cancel access control method based on the user acting on behalf of re-encryption as claimed in claim 1, it is characterised in that described In step S2, comprise the steps:
Step S21, described Attribute Authority is to not cancelling user's transmission
Step S22, do not cancel user according toWith current accessed private key SKj,n, calculate the access private key after updating
4. cancel access control method based on the user acting on behalf of re-encryption as claimed in claim 3, it is characterised in that
SK j , k = ( K j , k = g α k z j · g au j · g at j , k β k , L j , k = g β k t j , k z j , R j , k = g at j , k , M j , k = g at j , k ,
∀ x k ∈ S j , k : K j , x k = g β k γ k t j . k z j · ( g v x k · H ( x k ) ) γ k β k u i d · KUK j , x ~ n , ∀ x k ∈ S U , x k ≠ x ~ n : K j , x k ′ = K j , x k )
Wherein, tj,kIt is ZpIn a random number.
5. cancel access control method based on the user acting on behalf of re-encryption as claimed in claim 1, it is characterised in that described In step S3,
Step S31, described Attribute Authority sends to Cloud Server
Step S32, described Cloud Server according toCurrently comprise and cancelled attributeCiphertext CT, calculate update after Ciphertext CT '.
6. cancel access control method based on the user acting on behalf of re-encryption as claimed in claim 5, it is characterised in that
CT ′ = ( C = κ · ( Π k ∈ I A e ( g , g ) α k ) s , C ′ = g s , C ′ ′ = g s β k ,
∀ i ∈ [ 1 , l ] , ρ ( i ) = x ~ n : C i = g aλ i · ( ( g v ρ ( i ) H ( ρ ( i ) ) ) γ k ) - γ i , D 1 , i = g r i β k , D 2 , i = g - γ k β k r i ,
∀ i ∈ [ 1 , l ] , ρ ( i ) ≠ x ~ n , C i = g aλ i · ( ( g v p ( i ) H ( ρ ( i ) ) ) γ k ) - γ i · D 2 , i CTUP x ~ n , D 1 , i ′ = g r i β k , D 2 , i ′ = g - γ k β k r i ) .
CN201610456710.4A 2016-06-22 2016-06-22 User based on proxy re-encryption cancels access control method Active CN105871551B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610456710.4A CN105871551B (en) 2016-06-22 2016-06-22 User based on proxy re-encryption cancels access control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610456710.4A CN105871551B (en) 2016-06-22 2016-06-22 User based on proxy re-encryption cancels access control method

Publications (2)

Publication Number Publication Date
CN105871551A true CN105871551A (en) 2016-08-17
CN105871551B CN105871551B (en) 2019-08-06

Family

ID=56649855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610456710.4A Active CN105871551B (en) 2016-06-22 2016-06-22 User based on proxy re-encryption cancels access control method

Country Status (1)

Country Link
CN (1) CN105871551B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106612175A (en) * 2016-08-25 2017-05-03 四川用联信息技术有限公司 Proxy re-encryption algorithm for multi-element access control in mobile cloud
CN107359986A (en) * 2017-07-03 2017-11-17 暨南大学 The outsourcing encryption and decryption CP ABE methods of user revocation
CN113486384A (en) * 2021-07-28 2021-10-08 北京字节跳动网络技术有限公司 Key updating method, device, multi-attribute authority management system, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7313238B2 (en) * 2003-01-31 2007-12-25 Hewlett-Packard Development Company, L.P. Method and system for relating cryptographic keys
CN103944975A (en) * 2014-04-03 2014-07-23 武汉大学 File safe sharing method based on mobile social network supporting user revocation
CN104113408A (en) * 2014-07-11 2014-10-22 西安电子科技大学 Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption
CN104717297A (en) * 2015-03-30 2015-06-17 上海交通大学 Safety cloud storage method and system
CN105049430A (en) * 2015-06-30 2015-11-11 河海大学 Ciphertext-policy attribute-based encryption method having efficient user revocation capability
CN105071937A (en) * 2015-07-14 2015-11-18 河海大学 Ciphertext poly attribute base encryption method having efficient attribute revocation capability

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7313238B2 (en) * 2003-01-31 2007-12-25 Hewlett-Packard Development Company, L.P. Method and system for relating cryptographic keys
CN103944975A (en) * 2014-04-03 2014-07-23 武汉大学 File safe sharing method based on mobile social network supporting user revocation
CN104113408A (en) * 2014-07-11 2014-10-22 西安电子科技大学 Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption
CN104717297A (en) * 2015-03-30 2015-06-17 上海交通大学 Safety cloud storage method and system
CN105049430A (en) * 2015-06-30 2015-11-11 河海大学 Ciphertext-policy attribute-based encryption method having efficient user revocation capability
CN105071937A (en) * 2015-07-14 2015-11-18 河海大学 Ciphertext poly attribute base encryption method having efficient attribute revocation capability

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SHUCHENG YU: ""Achieving Secure, Scalable, and Fine-grained Data", 《INFOCOM, 2010 PROCEEDINGS IEEE》 *
王静宇等: ""一种基于属性加密的细粒度云访问控制方案"", 《微电子学与计算机》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106612175A (en) * 2016-08-25 2017-05-03 四川用联信息技术有限公司 Proxy re-encryption algorithm for multi-element access control in mobile cloud
CN107359986A (en) * 2017-07-03 2017-11-17 暨南大学 The outsourcing encryption and decryption CP ABE methods of user revocation
CN113486384A (en) * 2021-07-28 2021-10-08 北京字节跳动网络技术有限公司 Key updating method, device, multi-attribute authority management system, equipment and medium

Also Published As

Publication number Publication date
CN105871551B (en) 2019-08-06

Similar Documents

Publication Publication Date Title
CN104113408B (en) It is a kind of realize the revocation of timely user property based on ciphertext policy ABE encryption method
CN102655508B (en) Method for protecting privacy data of users in cloud environment
CN109120639A (en) A kind of data cloud storage encryption method and system based on block chain
CN107359986A (en) The outsourcing encryption and decryption CP ABE methods of user revocation
CN103427998B (en) The authentication of a kind of Internet data distribution and data ciphering method
CN104022869B (en) Data fine-grained access control method based on key burst
CN103179114A (en) Fine-grained access control method for data in cloud storage
Beaver et al. Key management for SCADA
CN107426162B (en) A kind of method based on attribute base encryption Implement Core mutual role help
CN105208007A (en) Data sharing system
DE112019001441T5 (en) FORGETTABLE PSEUDO ACCIDENT FUNCTION IN A KEY MANAGEMENT SYSTEM
CN106612271A (en) Encryption and access control method for cloud storage
CN106788988B (en) Voidable key polymerize encryption method under cloud environment
CN105100083A (en) Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo
CN112487443A (en) Energy data fine-grained access control method based on block chain
CN115426136B (en) Cross-domain access control method and system based on block chain
CN107040374A (en) The attribute base data encryption method of user's Dynamic Revocation is supported under a kind of cloud storage environment
CN105871551B (en) User based on proxy re-encryption cancels access control method
CN115883154A (en) Access certificate issuing method, block chain-based data access method and device
CN113949541B (en) DDS (direct digital synthesizer) secure communication middleware design method based on attribute strategy
CN110933052A (en) Encryption and policy updating method based on time domain in edge environment
CN104202317A (en) Cloud platform data management method and system
Daza et al. Mutual accountability layer: accountable anonymity within accountable trust
Zhang et al. Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV
Wen et al. Security and efficiency enhanced revocable access control for fog-based smart grid system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant