CN105978895A - Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation - Google Patents

Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation Download PDF

Info

Publication number
CN105978895A
CN105978895A CN201610486535.3A CN201610486535A CN105978895A CN 105978895 A CN105978895 A CN 105978895A CN 201610486535 A CN201610486535 A CN 201610486535A CN 105978895 A CN105978895 A CN 105978895A
Authority
CN
China
Prior art keywords
attribute
calculate
private key
access structure
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610486535.3A
Other languages
Chinese (zh)
Inventor
赵洋
熊虎
范鹏程
蔡浩庭
孙剑飞
孙伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201610486535.3A priority Critical patent/CN105978895A/en
Publication of CN105978895A publication Critical patent/CN105978895A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation. The scheme is characterized in that the non-monotonic access structure and fine-granularity cancellation technology is utilized in the construction, so that the attribute set scale of the attribute-based encryption scheme supporting the non-monotonic access structure and fine-granularity cancellation is less than that of the attribute-based encryption scheme achieving the same efficacy; and meanwhile, the attribute-based encryption scheme further supports the management on the user right at the user attribute level through the fine-granularity cancellation; the scheme provided by the invention has a certain efficiency promotion and good flexibility. The encryption scheme totally has the following four algorithms: initialization, encryption, key generation and decryption.

Description

Support the attribute base encipherment scheme that non-monotonic access structure and fine granularity are cancelled
Technical field
The present invention relates to attribute base field of encryption, be especially and a kind of support what non-monotonic access structure and fine granularity were cancelled The building method of attribute base encipherment scheme.
Background technology
In the Internet and cloud computing epoch, the data that there is magnanimity need encryption, transmission and access, how this multiple Miscellaneous network cloud ensures the safety of data access, motility, is a complexity and the problem needing solution badly, now attribute Base encryption is arisen at the historic moment.The identity characteristic of user is turned to a community set by the encryption of attribute base, utilizes the incompatible logarithm of property set According to encryption and access be controlled, encipherer is not required to know the concrete identity of deciphering person, only need to specify respective attributes set and Access strategy, and for deciphering person, only need to verify whether the community set self having meets access strategy, therefore Attribute base is encrypted in the network environment of complexity has high motility and safety.
During the encryption reality application of attribute base, usually can be along with the permission modification of user with cancel, namely Say attribute base encipherment scheme to need user property, system property to be managed, thus attribute is cancelled and become attribute base encryption side Requisite part in case, and attribute to cancel also be one of focus in the last few years, difficult point.Work as at attribute base encipherment scheme In, the negative form of attribute may be there is, such as: " doctor ", " non-physician " etc., if community set is the hugest, and draw Entering the most multiattribute negative form, community set will certainly be the hugest, and the problem how solving community set the hugest is also One problem.
Attribute can be utilized to cancel for user authority management to manage, for solving the attribute containing attribute negative form Collect the hugest problem, it is possible to use nonmonotonic access structure solves.But in invention disclosed patent, only have Support the patent of invention that fine granularity attribute is cancelled, such as patent " voidable attribute base cryptographic methods based on ciphertext policy, equipment And system " (patent publication No. 102546161A, application number 201010587247.X), also do not have and support non-monotonic access structure Patent of invention, the present invention and foregoing invention difference are for support that non-monotonic access structure and fine granularity attribute are cancelled simultaneously.
Summary of the invention
It is intended to propose an attribute base encipherment scheme supporting non-monotonic access structure and fine granularity to cancel, utilizes non- Dull access structure, can reach same effect without any negative attribute, thus reduce property set to a certain extent The scale closed;Flexible management for user right provides a kind of settling mode simultaneously, and this programme can reach in user property rank Cancel to fine-grained attribute.
Technical scheme is by four Algorithm constitutions: initialize Setup (1λ, d, n), encrypts Private key generatesDeciphering Decryption (E, D).
Four algorithms of technical solution of the present invention specifically describe:
Initialize Setup (1λ, d, n): generate common parameter and master key for system;
EncryptionBy plain text encryption, and generate the information that decrypting process needs, according to attribute Revocation list is the information that attribute generates for cancelling checking, finally all information integration is formed ciphertext;
Private key generatesIt is that user generates respectively according to positive attribute and negative attribute Different piece private key, and generate the information for cancelling checking for user;
Deciphering Decryption (E, D): utilize encryption and private key to generate the information for cancelling checking during generating, test Whether card user is for cancelling user, if not being revoked, utilizes the private key generated and ciphertext deciphering can obtain in plain text.
Accompanying drawing explanation
The present invention can be following by with reference to being better understood below in association with the detailed description given by accompanying drawing Drawings and detailed description are the part of this specification, for combining principle and the advantage describing the present invention, accompanying drawing explanation As follows:
Fig. 1 illustrates the initialization flowchart of the present invention;
Fig. 2 illustrates the flow chart that the present invention encrypts;
Fig. 3 illustrates the flow chart that user key of the present invention generates;
Fig. 4 illustrates the flow chart that user of the present invention deciphers.
Detailed description of the invention
Fig. 1 illustrates the initialization flowchart of the present invention.
Initialize Setup (1λ, d, n): three input parameters of this algorithm acceptance: security parameter 1λ, attribute number d, user Number n;Positive attribute (non-negative attribute) is made to collectAnd make ID set U={1,2 ..., n}, at random SelectFor any attributeCalculateRandomly chooseFor arbitrary i ∈ 1,2 ..., n, n+2 ..., 2n}, calculateRandomly select two secret valueCalculate g1=gα, g2=gβ;Randomly selecting multinomial h (x) on two d rank, q (x), constraints is q (0)=β, finally randomly selects a ∈ Zp1;Public ginseng Number is:
PK=(N, g, ga, g1, g2;gq(1), gq(2)..., gq(d);gh(0), gh(1)..., gh(d)
Master key is:Letter NumberDefined in common parameter, being disclosed, computable, function is defined as:
T ( x ) = g 2 x d · g h ( x ) , V ( x ) = g q ( x ) .
Fig. 2 illustrates the flow chart that the present invention encrypts.
EncryptionThis algorithm three parameters of acceptance: plaintext M, community setCommon parameter PK; In plain textUtilize community setEncrypting plaintext, randomly choosesCalculate: E(1)=Me (g1, g2)s·e(f1, fn)y, E(2)=gs, E(3)=(ga)y;For arbitrarilyCalculate:Randomly choose One d rank multinomial l (x), constraints is: l (0)=y;For arbitrary attributeSxNon-for each attribute is removed Pin list, RxFor revocation list, orderCalculate:If Sx≠ U, say, thatRandomly chooseAnd calculate: WhereinIt is for randomizationPrevent e (g1, gn)l(x)Dived Opponent be calculated;If Sx=U, say, thatCalculate: I.e. ηx=sx=0, then export ciphertext:
E = ( γ , E ( 1 ) , E ( 2 ) , { E x ( 3 ) , E x ( 4 ) E x ( 5 ) , E x ( 6 ) , E x ( 7 ) , E x ( 8 ) , E x ( 9 ) , E x ( 10 ) } x ∈ S ~ ) .
Fig. 3 illustrates the flow chart that user key of the present invention generates.
Private key generatesThis algorithm three parameters of acceptance: non-monotonic access structure Master key MK, common parameter PK;ExceptIn attribute (if can inquire about efficiently), the negative form of remaining attribute existsIn, then this algorithm will generate private key for user, utilize linear secret sharing technology (LSSS) can obtain dividing of secret α Enjoy value { λi, and be that each attribute mark i selectsFor arbitrary i, attributeIt is positive, calculates:It is to act on positive community set that fine granularity is cancelled;Randomly chooseCalculate: Then export The actively part private key of attribute x:For arbitrary i, attributeIt is negative, Calculate:The part private key of then output negative attribute x ':It is by all of D to all of i, private key DiComposition.
Fig. 4 illustrates the flow chart that user of the present invention deciphers.
Deciphering Decryption (E, D): this algorithm two parameters of acceptance: ciphertext E, key D;
OrderUtilize LSSS can obtain a coefficient sets Ω={ ωi}i∈I, meet Σi∈I ωiλi=α (λi, α is unknown in decryption portion).
For the most actively attribute i, i.e.Calculate: For arbitrarily negative attribute i, i.e.OrderHaveCalculate Lagrange system NumberThis coefficient sets meetsThen calculate:
Z i = e ( D i ( 6 ) , E ( 2 ) ) e ( D i ( 8 ) , Π x ∈ S ~ ( E x ( 5 ) ) σ x ) · e ( D i ( 7 ) , E ( 2 ) ) σ x i = e ( g 2 λ i + r i , g s ) e ( g r i , Π x ∈ S ~ ( V ( x ) s ) σ x ) · e ( V ( x i ) r i , g s ) σ x i = e ( g 2 λ i , g s ) · e ( g 2 λ i , g s ) e ( g r i , g sΣ x ∈ S ~ σ x q ( x ) ) · e ( g r i σ x i q ( x i ) , g s ) = e ( g 2 , g ) sλ i · e ( g , g ) r i s β e ( g , g ) r i sΣ x ∈ N ( S ~ ) σ x q ( x ) = e ( g 2 , g ) sλ i .
Carry out cancelling checking to calculate, orderFor any x ∈ L, calculate:
X i = e ( D i ( 4 ) , E x ( 6 ) ) e ( E x ( 6 ) , Π j ∈ S x , j ≠ I D f n + 1 - j + I D ) e ( f I D , E x ( 10 ) ) e ( D i ( 5 ) , E x ( 7 ) ) e ( f I D , E x ( 8 ) ) e ( E x ( 9 ) , Π j ∈ R x f n + 1 - j + I D ) = e ( g a t , g l ( x ) ) e ( f 1 , f n ) l ( x ) .
Above-mentioned result of calculation is finally utilized to be decrypted, orderCalculate:
E ( 1 ) Π i ∈ I Z i · Π i ∈ A X i e ( D i ( 3 ) , E ( 3 ) ) = M e ( g 1 , g 2 ) s e ( f 1 , f n ) y · e ( g a t , g y ) e ( g 2 , g ) s α · e ( f 1 , f n ) y e ( g t , g a y ) = M .

Claims (2)

1. the attribute base encryption system supporting non-monotonic access structure and fine granularity to cancel, is characterized in that utilizing in structure Non-monotonic access structure and fine granularity cancel technology so that it is control in terms of motility and cryptographic attributes collection scale respectively accessing Being better than existing cancelling and the attribute base encipherment scheme of dull access structure based on coarseness, this programme has following four step Rapid:
(1) Setup (1 is initializedλ, d, n): generate common parameter and master key for system;
(2) encryptionBy plain text encryption, and generate the information that decrypting process needs, according to attribute Revocation list is the information that attribute generates for cancelling checking, finally all information integration is formed ciphertext;
(3) private key generatesIt is that user generates respectively according to positive attribute and negative attribute Different piece private key, and generate the information for cancelling checking for user;
(4) deciphering Decryption (E, D): utilize encryption and private key to generate the information for cancelling checking during generating, test Whether card user is for cancelling user, if not being revoked, utilizes the private key generated and ciphertext deciphering can obtain in plain text.
The attribute base encryption system that the non-monotonic access structure of support the most according to claim 1 and fine granularity are cancelled, it is special Levying and be, described scheme specifically comprises the steps of
(1) Setup (1 is initializedλ, d, n): three input parameters of this algorithm acceptance: security parameter 1λ, attribute number d, user Number n;Make positive property setAnd make ID set U={1,2 ..., n}, randomly choose For any attributeCalculateRandomly chooseFor arbitrary i ∈ 1,2 ... n, n+ 2 ..., 2n}, calculateRandomly select two secret valueCalculate g1=gα, g2=gβ;Randomly select two Multinomial h (x) on d rank, q (x), constraints is q (0)=β;Finally randomly selectThen common parameter is: {fi}I ∈ 1,2 ..., n, n+2 ..., 2n}), master key is:Function Defined in common parameter, being disclosed, computable, function is defined as:V (x)=gq(x)
(2) encryptionThis algorithm three parameters of acceptance: plaintext M, community setCommon parameter PK; In plain textUtilize community setEncrypting plaintext, randomly choosesCalculate: E(1)=Me (g1, g2)s·e(f1, fn)y, E(2)=gs, E(3)=(ga)y;For arbitrarilyCalculate:Randomly choose One d rank multinomial l (x), constraints is: l (0)=y;For arbitrary attributeSxNon-for each attribute is removed Pin list, RxFor revocation list, orderCalculate:If Sx≠ U, That isRandomly chooseAnd calculate: Wherein ηx, sx,It is for randomizationPrevent e (g1, gn)l(x)By potential Opponent is calculated;If Sx=U, say, thatCalculate: I.e. ηx=sx=0, then export ciphertext:
(3) private key generatesThis algorithm three parameters of acceptance: non-monotonic access structureMain Key MK, common parameter PK;ExceptIn attribute (if can inquire about efficiently), the negative form of remaining attribute existsIn, then this algorithm will generate private key for user, utilize linear secret sharing technology (LSSS) can obtain dividing of secret α Enjoy value { λi, and be that each attribute mark i selectsFor arbitrary i, attributeIt is positive, calculates:It is to act on positive community set that fine granularity is cancelled, and first, randomly choosesCalculate:The most defeated Go out the part private key of positive attribute x:For arbitrary i, attributeIt is negative, Calculate:The part private key of then output negative attribute x ':It is by all of D to all of i, private key DiComposition;
(4) deciphering Decryption (E, D): this algorithm two parameters of acceptance: ciphertext E, key D;OrderUtilize LSSS can obtain a coefficient sets Ω={ ωi}i∈I, meet Σi∈Iωiλi=α (λi, α is unknown in decryption portion);For appointing Anticipate positive attribute i, i.e. Calculate: For arbitrarily negative attribute i, i.e.OrderHaveAccording to function V (x) andCalculate Lagrange coefficientThis coefficient sets meetsThen calculate:
Then carry out cancelling checking to calculate, orderFor any x ∈ L, calculate:? After utilize above-mentioned result of calculation to be decrypted, orderCalculate:
CN201610486535.3A 2016-06-28 2016-06-28 Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation Pending CN105978895A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610486535.3A CN105978895A (en) 2016-06-28 2016-06-28 Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610486535.3A CN105978895A (en) 2016-06-28 2016-06-28 Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation

Publications (1)

Publication Number Publication Date
CN105978895A true CN105978895A (en) 2016-09-28

Family

ID=57020757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610486535.3A Pending CN105978895A (en) 2016-06-28 2016-06-28 Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation

Country Status (1)

Country Link
CN (1) CN105978895A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106549758A (en) * 2016-12-09 2017-03-29 四川师范大学 Support the encryption method based on attribute of non-monotonic access structure
CN107426187A (en) * 2017-06-27 2017-12-01 江苏大学 A kind of in-vehicle network fine granularity mandate access method based on ECU identity attributes
CN108880798A (en) * 2018-06-28 2018-11-23 西南交通大学 A kind of attribute base weight encryption method for realizing the revocation of fine granularity attribute

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297227A (en) * 2013-07-02 2013-09-11 西安电子科技大学 Attribute-based encryption supporting flexible and direct-revocatory ciphertext policy
CN105071937A (en) * 2015-07-14 2015-11-18 河海大学 Ciphertext poly attribute base encryption method having efficient attribute revocation capability

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297227A (en) * 2013-07-02 2013-09-11 西安电子科技大学 Attribute-based encryption supporting flexible and direct-revocatory ciphertext policy
CN105071937A (en) * 2015-07-14 2015-11-18 河海大学 Ciphertext poly attribute base encryption method having efficient attribute revocation capability

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
RAFAIL OSTROVSKY,ET AL.: "Attribute-Based Encryption with Non-Monotonic Access Structures", 《PROCEEDING OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY》 *
王鹏翩 等: "一种支持完全细粒度属性撤销的CP-ABE方案", 《软件学报》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106549758A (en) * 2016-12-09 2017-03-29 四川师范大学 Support the encryption method based on attribute of non-monotonic access structure
CN106549758B (en) * 2016-12-09 2019-07-30 四川师范大学 Support the encryption method based on attribute of non-monotonic access structure
CN107426187A (en) * 2017-06-27 2017-12-01 江苏大学 A kind of in-vehicle network fine granularity mandate access method based on ECU identity attributes
CN108880798A (en) * 2018-06-28 2018-11-23 西南交通大学 A kind of attribute base weight encryption method for realizing the revocation of fine granularity attribute
CN108880798B (en) * 2018-06-28 2020-11-03 西南交通大学 Attribute basis weight encryption method for realizing fine-grained attribute revocation

Similar Documents

Publication Publication Date Title
CN108881314B (en) Privacy protection method and system based on CP-ABE ciphertext under fog computing environment
CN112019591B (en) Cloud data sharing method based on block chain
CN102624522B (en) A kind of key encryption method based on file attribute
CN104113408B (en) It is a kind of realize the revocation of timely user property based on ciphertext policy ABE encryption method
CN106059763B (en) The properties base multi-mechanism hierarchical Ciphertext policy weight encryption method of cloud environment
CN103401839B (en) A kind of many authorization center encryption method based on attribute protection
CN104320393B (en) The controllable efficient attribute base proxy re-encryption method of re-encryption
CN111859444B (en) Block chain data supervision method and system based on attribute encryption
CN106161428B (en) A kind of ciphertext can comparison of equalization encryption attribute method
CN103618728A (en) Attribute-based encryption method for multiple authority centers
CN105406967A (en) Hierarchical attribute encryption method
CN103618729A (en) Multi-mechanism hierarchical attribute-based encryption method applied to cloud storage
CN104363215A (en) Encryption method and system based on attributes
CN110933033B (en) Cross-domain access control method for multiple Internet of things domains in smart city environment
CN108092972A (en) A kind of more authorization centers can search for encryption method based on attribute
CN104883254A (en) Cloud computing platform oriented cryptograph access control system and access control method thereof
CN113360944B (en) Dynamic access control system and method for electric power Internet of things
CN104135473A (en) A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption
US12003650B2 (en) Data communication between a group of users
CN108989037A (en) A kind of more authorization attribute base encryption methods, system, equipment and computer media
CN101707524A (en) Method for encrypting public key broadcasts with hierarchical relationship
CN105978895A (en) Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation
CN109740383B (en) Privacy protection control method for fog computing-oriented medical system
CN106888213A (en) Cloud ciphertext access control method and system
CN104993929A (en) Attribute-based encryption system and method supporting system attribute expansion

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160928