CN105978895A - Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation - Google Patents
Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation Download PDFInfo
- Publication number
- CN105978895A CN105978895A CN201610486535.3A CN201610486535A CN105978895A CN 105978895 A CN105978895 A CN 105978895A CN 201610486535 A CN201610486535 A CN 201610486535A CN 105978895 A CN105978895 A CN 105978895A
- Authority
- CN
- China
- Prior art keywords
- attribute
- calculate
- private key
- access structure
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation. The scheme is characterized in that the non-monotonic access structure and fine-granularity cancellation technology is utilized in the construction, so that the attribute set scale of the attribute-based encryption scheme supporting the non-monotonic access structure and fine-granularity cancellation is less than that of the attribute-based encryption scheme achieving the same efficacy; and meanwhile, the attribute-based encryption scheme further supports the management on the user right at the user attribute level through the fine-granularity cancellation; the scheme provided by the invention has a certain efficiency promotion and good flexibility. The encryption scheme totally has the following four algorithms: initialization, encryption, key generation and decryption.
Description
Technical field
The present invention relates to attribute base field of encryption, be especially and a kind of support what non-monotonic access structure and fine granularity were cancelled
The building method of attribute base encipherment scheme.
Background technology
In the Internet and cloud computing epoch, the data that there is magnanimity need encryption, transmission and access, how this multiple
Miscellaneous network cloud ensures the safety of data access, motility, is a complexity and the problem needing solution badly, now attribute
Base encryption is arisen at the historic moment.The identity characteristic of user is turned to a community set by the encryption of attribute base, utilizes the incompatible logarithm of property set
According to encryption and access be controlled, encipherer is not required to know the concrete identity of deciphering person, only need to specify respective attributes set and
Access strategy, and for deciphering person, only need to verify whether the community set self having meets access strategy, therefore
Attribute base is encrypted in the network environment of complexity has high motility and safety.
During the encryption reality application of attribute base, usually can be along with the permission modification of user with cancel, namely
Say attribute base encipherment scheme to need user property, system property to be managed, thus attribute is cancelled and become attribute base encryption side
Requisite part in case, and attribute to cancel also be one of focus in the last few years, difficult point.Work as at attribute base encipherment scheme
In, the negative form of attribute may be there is, such as: " doctor ", " non-physician " etc., if community set is the hugest, and draw
Entering the most multiattribute negative form, community set will certainly be the hugest, and the problem how solving community set the hugest is also
One problem.
Attribute can be utilized to cancel for user authority management to manage, for solving the attribute containing attribute negative form
Collect the hugest problem, it is possible to use nonmonotonic access structure solves.But in invention disclosed patent, only have
Support the patent of invention that fine granularity attribute is cancelled, such as patent " voidable attribute base cryptographic methods based on ciphertext policy, equipment
And system " (patent publication No. 102546161A, application number 201010587247.X), also do not have and support non-monotonic access structure
Patent of invention, the present invention and foregoing invention difference are for support that non-monotonic access structure and fine granularity attribute are cancelled simultaneously.
Summary of the invention
It is intended to propose an attribute base encipherment scheme supporting non-monotonic access structure and fine granularity to cancel, utilizes non-
Dull access structure, can reach same effect without any negative attribute, thus reduce property set to a certain extent
The scale closed;Flexible management for user right provides a kind of settling mode simultaneously, and this programme can reach in user property rank
Cancel to fine-grained attribute.
Technical scheme is by four Algorithm constitutions: initialize Setup (1λ, d, n), encrypts
Private key generatesDeciphering Decryption (E, D).
Four algorithms of technical solution of the present invention specifically describe:
Initialize Setup (1λ, d, n): generate common parameter and master key for system;
EncryptionBy plain text encryption, and generate the information that decrypting process needs, according to attribute
Revocation list is the information that attribute generates for cancelling checking, finally all information integration is formed ciphertext;
Private key generatesIt is that user generates respectively according to positive attribute and negative attribute
Different piece private key, and generate the information for cancelling checking for user;
Deciphering Decryption (E, D): utilize encryption and private key to generate the information for cancelling checking during generating, test
Whether card user is for cancelling user, if not being revoked, utilizes the private key generated and ciphertext deciphering can obtain in plain text.
Accompanying drawing explanation
The present invention can be following by with reference to being better understood below in association with the detailed description given by accompanying drawing
Drawings and detailed description are the part of this specification, for combining principle and the advantage describing the present invention, accompanying drawing explanation
As follows:
Fig. 1 illustrates the initialization flowchart of the present invention;
Fig. 2 illustrates the flow chart that the present invention encrypts;
Fig. 3 illustrates the flow chart that user key of the present invention generates;
Fig. 4 illustrates the flow chart that user of the present invention deciphers.
Detailed description of the invention
Fig. 1 illustrates the initialization flowchart of the present invention.
Initialize Setup (1λ, d, n): three input parameters of this algorithm acceptance: security parameter 1λ, attribute number d, user
Number n;Positive attribute (non-negative attribute) is made to collectAnd make ID set U={1,2 ..., n}, at random
SelectFor any attributeCalculateRandomly chooseFor arbitrary i ∈
1,2 ..., n, n+2 ..., 2n}, calculateRandomly select two secret valueCalculate g1=gα, g2=gβ;Randomly selecting multinomial h (x) on two d rank, q (x), constraints is q (0)=β, finally randomly selects a ∈ Zp1;Public ginseng
Number is:
PK=(N, g, ga, g1, g2;gq(1), gq(2)..., gq(d);gh(0), gh(1)..., gh(d);
Master key is:Letter
NumberDefined in common parameter, being disclosed, computable, function is defined as:
Fig. 2 illustrates the flow chart that the present invention encrypts.
EncryptionThis algorithm three parameters of acceptance: plaintext M, community setCommon parameter PK;
In plain textUtilize community setEncrypting plaintext, randomly choosesCalculate: E(1)=Me (g1, g2)s·e(f1,
fn)y, E(2)=gs, E(3)=(ga)y;For arbitrarilyCalculate:Randomly choose
One d rank multinomial l (x), constraints is: l (0)=y;For arbitrary attributeSxNon-for each attribute is removed
Pin list, RxFor revocation list, orderCalculate:If
Sx≠ U, say, thatRandomly chooseAnd calculate: WhereinIt is for randomizationPrevent e (g1, gn)l(x)Dived
Opponent be calculated;If Sx=U, say, thatCalculate:
I.e. ηx=sx=0, then export ciphertext:
Fig. 3 illustrates the flow chart that user key of the present invention generates.
Private key generatesThis algorithm three parameters of acceptance: non-monotonic access structure
Master key MK, common parameter PK;ExceptIn attribute (if can inquire about efficiently), the negative form of remaining attribute existsIn, then this algorithm will generate private key for user, utilize linear secret sharing technology (LSSS) can obtain dividing of secret α
Enjoy value { λi, and be that each attribute mark i selectsFor arbitrary i, attributeIt is positive, calculates:It is to act on positive community set that fine granularity is cancelled;Randomly chooseCalculate: Then export
The actively part private key of attribute x:For arbitrary i, attributeIt is negative,
Calculate:The part private key of then output negative attribute x ':It is by all of D to all of i, private key DiComposition.
Fig. 4 illustrates the flow chart that user of the present invention deciphers.
Deciphering Decryption (E, D): this algorithm two parameters of acceptance: ciphertext E, key D;
OrderUtilize LSSS can obtain a coefficient sets Ω={ ωi}i∈I, meet Σi∈I
ωiλi=α (λi, α is unknown in decryption portion).
For the most actively attribute i, i.e.Calculate:
For arbitrarily negative attribute i, i.e.OrderHaveCalculate Lagrange system
NumberThis coefficient sets meetsThen calculate:
Carry out cancelling checking to calculate, orderFor any x ∈ L, calculate:
Above-mentioned result of calculation is finally utilized to be decrypted, orderCalculate:
Claims (2)
1. the attribute base encryption system supporting non-monotonic access structure and fine granularity to cancel, is characterized in that utilizing in structure
Non-monotonic access structure and fine granularity cancel technology so that it is control in terms of motility and cryptographic attributes collection scale respectively accessing
Being better than existing cancelling and the attribute base encipherment scheme of dull access structure based on coarseness, this programme has following four step
Rapid:
(1) Setup (1 is initializedλ, d, n): generate common parameter and master key for system;
(2) encryptionBy plain text encryption, and generate the information that decrypting process needs, according to attribute
Revocation list is the information that attribute generates for cancelling checking, finally all information integration is formed ciphertext;
(3) private key generatesIt is that user generates respectively according to positive attribute and negative attribute
Different piece private key, and generate the information for cancelling checking for user;
(4) deciphering Decryption (E, D): utilize encryption and private key to generate the information for cancelling checking during generating, test
Whether card user is for cancelling user, if not being revoked, utilizes the private key generated and ciphertext deciphering can obtain in plain text.
The attribute base encryption system that the non-monotonic access structure of support the most according to claim 1 and fine granularity are cancelled, it is special
Levying and be, described scheme specifically comprises the steps of
(1) Setup (1 is initializedλ, d, n): three input parameters of this algorithm acceptance: security parameter 1λ, attribute number d, user
Number n;Make positive property setAnd make ID set U={1,2 ..., n}, randomly choose
For any attributeCalculateRandomly chooseFor arbitrary i ∈ 1,2 ... n, n+
2 ..., 2n}, calculateRandomly select two secret valueCalculate g1=gα, g2=gβ;Randomly select two
Multinomial h (x) on d rank, q (x), constraints is q (0)=β;Finally randomly selectThen common parameter is:
{fi}I ∈ 1,2 ..., n, n+2 ..., 2n}), master key is:Function
Defined in common parameter, being disclosed, computable, function is defined as:V (x)=gq(x);
(2) encryptionThis algorithm three parameters of acceptance: plaintext M, community setCommon parameter PK;
In plain textUtilize community setEncrypting plaintext, randomly choosesCalculate: E(1)=Me (g1, g2)s·e(f1,
fn)y, E(2)=gs, E(3)=(ga)y;For arbitrarilyCalculate:Randomly choose
One d rank multinomial l (x), constraints is: l (0)=y;For arbitrary attributeSxNon-for each attribute is removed
Pin list, RxFor revocation list, orderCalculate:If Sx≠ U,
That isRandomly chooseAnd calculate: Wherein ηx, sx,It is for randomizationPrevent e (g1, gn)l(x)By potential
Opponent is calculated;If Sx=U, say, thatCalculate:
I.e. ηx=sx=0, then export ciphertext:
(3) private key generatesThis algorithm three parameters of acceptance: non-monotonic access structureMain
Key MK, common parameter PK;ExceptIn attribute (if can inquire about efficiently), the negative form of remaining attribute existsIn, then this algorithm will generate private key for user, utilize linear secret sharing technology (LSSS) can obtain dividing of secret α
Enjoy value { λi, and be that each attribute mark i selectsFor arbitrary i, attributeIt is positive, calculates:It is to act on positive community set that fine granularity is cancelled, and first, randomly choosesCalculate:The most defeated
Go out the part private key of positive attribute x:For arbitrary i, attributeIt is negative,
Calculate:The part private key of then output negative attribute x ':It is by all of D to all of i, private key DiComposition;
(4) deciphering Decryption (E, D): this algorithm two parameters of acceptance: ciphertext E, key D;OrderUtilize
LSSS can obtain a coefficient sets Ω={ ωi}i∈I, meet Σi∈Iωiλi=α (λi, α is unknown in decryption portion);For appointing
Anticipate positive attribute i, i.e. Calculate:
For arbitrarily negative attribute i, i.e.OrderHaveAccording to function V (x) andCalculate Lagrange coefficientThis coefficient sets meetsThen calculate:
Then carry out cancelling checking to calculate, orderFor any x ∈ L, calculate:?
After utilize above-mentioned result of calculation to be decrypted, orderCalculate:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610486535.3A CN105978895A (en) | 2016-06-28 | 2016-06-28 | Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610486535.3A CN105978895A (en) | 2016-06-28 | 2016-06-28 | Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105978895A true CN105978895A (en) | 2016-09-28 |
Family
ID=57020757
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610486535.3A Pending CN105978895A (en) | 2016-06-28 | 2016-06-28 | Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105978895A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106549758A (en) * | 2016-12-09 | 2017-03-29 | 四川师范大学 | Support the encryption method based on attribute of non-monotonic access structure |
CN107426187A (en) * | 2017-06-27 | 2017-12-01 | 江苏大学 | A kind of in-vehicle network fine granularity mandate access method based on ECU identity attributes |
CN108880798A (en) * | 2018-06-28 | 2018-11-23 | 西南交通大学 | A kind of attribute base weight encryption method for realizing the revocation of fine granularity attribute |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297227A (en) * | 2013-07-02 | 2013-09-11 | 西安电子科技大学 | Attribute-based encryption supporting flexible and direct-revocatory ciphertext policy |
CN105071937A (en) * | 2015-07-14 | 2015-11-18 | 河海大学 | Ciphertext poly attribute base encryption method having efficient attribute revocation capability |
-
2016
- 2016-06-28 CN CN201610486535.3A patent/CN105978895A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297227A (en) * | 2013-07-02 | 2013-09-11 | 西安电子科技大学 | Attribute-based encryption supporting flexible and direct-revocatory ciphertext policy |
CN105071937A (en) * | 2015-07-14 | 2015-11-18 | 河海大学 | Ciphertext poly attribute base encryption method having efficient attribute revocation capability |
Non-Patent Citations (2)
Title |
---|
RAFAIL OSTROVSKY,ET AL.: "Attribute-Based Encryption with Non-Monotonic Access Structures", 《PROCEEDING OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY》 * |
王鹏翩 等: "一种支持完全细粒度属性撤销的CP-ABE方案", 《软件学报》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106549758A (en) * | 2016-12-09 | 2017-03-29 | 四川师范大学 | Support the encryption method based on attribute of non-monotonic access structure |
CN106549758B (en) * | 2016-12-09 | 2019-07-30 | 四川师范大学 | Support the encryption method based on attribute of non-monotonic access structure |
CN107426187A (en) * | 2017-06-27 | 2017-12-01 | 江苏大学 | A kind of in-vehicle network fine granularity mandate access method based on ECU identity attributes |
CN108880798A (en) * | 2018-06-28 | 2018-11-23 | 西南交通大学 | A kind of attribute base weight encryption method for realizing the revocation of fine granularity attribute |
CN108880798B (en) * | 2018-06-28 | 2020-11-03 | 西南交通大学 | Attribute basis weight encryption method for realizing fine-grained attribute revocation |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108881314B (en) | Privacy protection method and system based on CP-ABE ciphertext under fog computing environment | |
CN112019591B (en) | Cloud data sharing method based on block chain | |
CN102624522B (en) | A kind of key encryption method based on file attribute | |
CN104113408B (en) | It is a kind of realize the revocation of timely user property based on ciphertext policy ABE encryption method | |
CN106059763B (en) | The properties base multi-mechanism hierarchical Ciphertext policy weight encryption method of cloud environment | |
CN103401839B (en) | A kind of many authorization center encryption method based on attribute protection | |
CN104320393B (en) | The controllable efficient attribute base proxy re-encryption method of re-encryption | |
CN111859444B (en) | Block chain data supervision method and system based on attribute encryption | |
CN106161428B (en) | A kind of ciphertext can comparison of equalization encryption attribute method | |
CN103618728A (en) | Attribute-based encryption method for multiple authority centers | |
CN105406967A (en) | Hierarchical attribute encryption method | |
CN103618729A (en) | Multi-mechanism hierarchical attribute-based encryption method applied to cloud storage | |
CN104363215A (en) | Encryption method and system based on attributes | |
CN110933033B (en) | Cross-domain access control method for multiple Internet of things domains in smart city environment | |
CN108092972A (en) | A kind of more authorization centers can search for encryption method based on attribute | |
CN104883254A (en) | Cloud computing platform oriented cryptograph access control system and access control method thereof | |
CN113360944B (en) | Dynamic access control system and method for electric power Internet of things | |
CN104135473A (en) | A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption | |
US12003650B2 (en) | Data communication between a group of users | |
CN108989037A (en) | A kind of more authorization attribute base encryption methods, system, equipment and computer media | |
CN101707524A (en) | Method for encrypting public key broadcasts with hierarchical relationship | |
CN105978895A (en) | Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation | |
CN109740383B (en) | Privacy protection control method for fog computing-oriented medical system | |
CN106888213A (en) | Cloud ciphertext access control method and system | |
CN104993929A (en) | Attribute-based encryption system and method supporting system attribute expansion |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160928 |