CN105978895A - Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation - Google Patents
Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation Download PDFInfo
- Publication number
- CN105978895A CN105978895A CN201610486535.3A CN201610486535A CN105978895A CN 105978895 A CN105978895 A CN 105978895A CN 201610486535 A CN201610486535 A CN 201610486535A CN 105978895 A CN105978895 A CN 105978895A
- Authority
- CN
- China
- Prior art keywords
- attribute
- calculate
- private key
- access structure
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000003121 nonmonotonic effect Effects 0.000 title claims abstract description 14
- 238000005516 engineering process Methods 0.000 claims abstract 3
- 238000000034 method Methods 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 4
- 230000010354 integration Effects 0.000 claims 1
- 230000004899 motility Effects 0.000 claims 1
- 230000008092 positive effect Effects 0.000 claims 1
- 238000010276 construction Methods 0.000 abstract description 2
- 238000012795 verification Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
本发明公开提出一种支持非单调访问结构和细粒度撤销的属性基加密方案,其特征在于在构造中利用了非单调访问结构和细粒度撤销技术,使得其在属性集规模方面要比达到同样功效的属性基加密方案要小,同时通过细粒度撤销也支持在用户属性级别对用户权限进行管理,使得本发明具有一定的效率提升,并具有很好的灵活性。本发明共有以下四个算法:初始化、加密、私钥生成、解密。
The present invention discloses an attribute-based encryption scheme supporting non-monotonic access structure and fine-grained revocation, which is characterized in that the non-monotonic access structure and fine-grained revocation technology are used in the construction, so that the size of the attribute set is smaller than that of the same The efficient attribute-based encryption scheme is small, and at the same time, the fine-grained revocation also supports the management of user rights at the user attribute level, so that the present invention has a certain efficiency improvement and good flexibility. The present invention has the following four algorithms in total: initialization, encryption, private key generation, and decryption.
Description
技术领域technical field
本发明涉及属性基加密领域,具体讲是一种支持非单调访问结构和细粒度撤销的属性基加密方案的构造方法。The invention relates to the field of attribute-based encryption, in particular to a construction method of an attribute-based encryption scheme supporting non-monotonic access structure and fine-grained revocation.
背景技术Background technique
在互联网和云计算时代,存在海量的数据需要加密、传输、和访问,如何在这种复杂的网络云中保证数据访问的安全性、灵活性,是一个复杂而又亟需解决的问题,此时属性基加密应运而生。属性基加密将用户的身份特征化为一个属性集合,利用属性集合来对数据的加密和访问进行控制,加密者不需知道解密者的具体身份,只需指定相应属性集合和访问策略即可,而对于解密者,只需验证自身具有的属性集合是否满足访问策略即可,因此属性基加密在复杂的网络环境中具有极高的灵活性和安全性。In the era of the Internet and cloud computing, there are massive amounts of data that need to be encrypted, transmitted, and accessed. How to ensure the security and flexibility of data access in this complex network cloud is a complex and urgent problem that needs to be solved. Time attribute based encryption came into being. Attribute-based encryption characterizes the user's identity as an attribute set, and uses the attribute set to control data encryption and access. The encryptor does not need to know the specific identity of the decryptor, but only needs to specify the corresponding attribute set and access strategy. For the decryptor, it only needs to verify whether the attribute set it has meets the access policy. Therefore, attribute-based encryption has extremely high flexibility and security in complex network environments.
在属性基加密实际应用的过程中,常常会伴随着用户的权限变更和撤销,也就是说属性基加密方案需要对用户属性、系统属性进行管理,因而属性撤销成为属性基加密方案中必不可少的部分,而且属性撤销也是近些年来的热点、难点之一。在属性基加密方案当中,可能会存在属性的否定形式,比如:“医生”、“非医生”等,假如属性集合很庞大,并且引入很多属性的否定形式,属性集合势必会很庞大,如何解决属性集合过于庞大的问题也是一个问题。In the process of practical application of attribute-based encryption, it is often accompanied by the change and revocation of user permissions. That is to say, the attribute-based encryption scheme needs to manage user attributes and system attributes, so attribute revocation becomes indispensable in the attribute-based encryption scheme. part, and attribute revocation is also one of the hot spots and difficulties in recent years. In the attribute-based encryption scheme, there may be negative forms of attributes, such as "doctor", "non-doctor", etc. If the attribute set is very large and many negative forms of attributes are introduced, the attribute set will inevitably be very large. How to solve it? The problem of an overly large set of attributes is also a problem.
对于用户权限管理可以利用属性撤销来管理,对于解决含有属性否定形式的属性集过于庞大的问题,可以利用非单调的访问结构来解决。但在现已公开的发明专利中,仅有支持细粒度属性撤销的发明专利,如专利《可撤销的基于密文政策的属性基密码方法、设备和系统》(专利公开号102546161A,申请号201010587247.X),还未有支持非单调访问结构的发明专利,本发明与上述发明不同之处为同时支持非单调访问结构和细粒度属性撤销。User rights management can be managed by using attribute revocation, and non-monotonic access structure can be used to solve the problem that the attribute set containing attribute negation form is too large. However, among the published invention patents, there are only invention patents that support fine-grained attribute revocation, such as the patent "Revocable ciphertext policy-based attribute-based encryption method, device and system" (Patent Publication No. 102546161A, Application No. 201010587247 .X), there is no invention patent that supports non-monotonic access structure. The difference between the present invention and the above-mentioned invention is that it supports non-monotonic access structure and fine-grained attribute revocation at the same time.
发明内容Contents of the invention
本文旨在提出一个支持非单调访问结构和细粒度撤销的属性基加密方案,利用非单调访问结构,可以不添加任何否定属性来达到相同效果,从而在一定程度上减小属性集合的规模;同时为用户权限的灵活管理提供一种解决方式,本方案可以在用户属性级别达到细粒度的属性撤销。This paper aims to propose an attribute-based encryption scheme that supports non-monotonic access structure and fine-grained revocation. Using non-monotonic access structure, the same effect can be achieved without adding any negative attributes, thereby reducing the size of the attribute set to a certain extent; at the same time To provide a solution for the flexible management of user rights, this scheme can achieve fine-grained attribute revocation at the user attribute level.
本发明的技术方案由四个算法构成:初始化Setup(1λ,d,n)、加密私钥生成解密Decryption(E,D)。The technical scheme of the present invention is made of four algorithms: initialization Setup (1 λ , d, n), encryption private key generation Decrypt Decryption(E, D).
本发明技术方案的四个算法具体描述:The four algorithms of the technical solution of the present invention are described in detail:
初始化Setup(1λ,d,n):为系统生成公共参数和主密钥;Initialize Setup(1 λ , d, n): generate public parameters and master keys for the system;
加密将明文加密,并生成解密过程需要的信息,根据属性的撤销列表为属性生成用于撤销验证的信息,最后将所有信息整合形成密文;encryption Encrypt the plaintext and generate the information required for the decryption process, generate information for revocation verification for the attribute according to the revocation list of the attribute, and finally integrate all the information into ciphertext;
私钥生成根据积极属性和否定属性为用户分别生成不同部分私钥,并为用户生成用于撤销验证的信息;private key generation Generate different parts of private keys for users according to positive attributes and negative attributes, and generate information for revoking verification for users;
解密Decryption(E,D):利用加密和私钥生成过程中生成用于撤销验证的信息,验证用户是否为撤销用户,若未被撤销,利用所生成的私钥和密文解密可以得到明文。Decryption Decryption (E, D): Use the information for revocation verification generated during encryption and private key generation to verify whether the user is a revocation user. If not, use the generated private key and decrypt the ciphertext to obtain the plaintext.
附图说明Description of drawings
本发明可以通过参考下文中结合附图所给出的详细描述而得到更好的理解,下述附图和详细说明为本说明书的一部分,用于结合来描述本发明的原理以及优点,附图说明如下:The present invention can be better understood by referring to the detailed description given below in conjunction with the accompanying drawings. The following drawings and detailed descriptions are part of this specification and are used to describe the principles and advantages of the present invention in conjunction with the accompanying drawings. described as follows:
图1示出本发明的初始化流程图;Fig. 1 shows the initialization flowchart of the present invention;
图2示出本发明加密的流程图;Fig. 2 shows the flowchart of encryption of the present invention;
图3示出本发明用户密钥生成的流程图;Fig. 3 shows the flowchart of user key generation of the present invention;
图4示出本发明用户解密的流程图。Fig. 4 shows the flowchart of user decryption in the present invention.
具体实施方式detailed description
图1示出本发明的初始化流程图。Fig. 1 shows the initialization flowchart of the present invention.
初始化Setup(1λ,d,n):该算法接受三个输入参数:安全参数1λ,属性个数d,用户个数n;令积极属性(非否定属性)集并且令用户ID集合U={1,2,...,n},随机选择对于任意属性计算随机选择对于任意的i∈{1,2,...,n,n+2,...,2n},计算随机选取两个秘密值计算g1=gα,g2=gβ;随机选取两个d阶的多项式h(x),q(x),约束条件是q(0)=β,最后随机选取a∈Zp1;公共参数为:Initialization Setup(1 λ , d, n): The algorithm accepts three input parameters: security parameter 1 λ , number of attributes d, number of users n; let positive attribute (non-negative attribute) set And let the user ID set U={1, 2,...,n}, choose randomly for any attribute calculate random selection For any i ∈ {1, 2, ..., n, n+2, ..., 2n}, compute Randomly pick two secret values Calculate g 1 =g α , g 2 =g β ; randomly select two d-order polynomials h(x), q(x), the constraint condition is q(0)=β, and finally randomly select a∈Z p1 ; public The parameters are:
PK=(N,g,ga,g1,g2;gq(1),gq(2),...,gq(d);gh(0),gh(1),...,gh(d);PK=(N, g, g a , g 1 , g 2 ; g q(1) , g q(2) ,..., g q(d) ; g h(0) , g h(1) , ...,g h(d) ;
主密钥为:函数是在公共参数中定义的,是公开的、可计算的,函数定义为: The master key is: function is defined in the public parameter, is public and computable, and the function is defined as:
图2示出本发明加密的流程图。Fig. 2 shows the flow chart of the encryption of the present invention.
加密该算法接受三个参数:明文M,属性集合公共参数PK;明文利用属性集合加密明文,随机选择计算:E(1)=Me(g1,g2)s·e(f1,fn)y,E(2)=gs,E(3)=(ga)y;对于任意的计算:随机选择一个d阶多项式l(x),约束条件为:l(0)=y;对于任意的属性Sx为每个属性的非撤销列表,Rx为撤销列表,令计算:如果Sx≠U,也就是说随机选择并且计算: 其中是用于随机化防止e(g1,gn)l(x)被潜在的敌手计算得到;如果Sx=U,也就是说计算:即ηx=sx=0,接着输出密文:encryption The algorithm accepts three parameters: plaintext M, attribute set Public parameter PK; plaintext Using attribute collections Encrypted plaintext, randomly selected Calculation: E (1) = Me(g 1 , g 2 ) s e(f 1 , f n ) y , E (2) = g s , E (3) = (g a ) y ; for any calculate: Randomly select a d-order polynomial l(x), the constraints are: l(0)=y; for any attribute S x is the non-revocation list of each attribute, R x is the revocation list, let calculate: If S x ≠ U, that is random selection and calculate: in is used for randomization Prevent e(g 1 , g n ) l(x) from being calculated by potential adversaries; if S x = U, that is to say calculate: That is, η x =s x =0, and then output the ciphertext:
图3示出本发明用户密钥生成的流程图。Fig. 3 shows a flowchart of user key generation in the present invention.
私钥生成该算法接受三个参数:非单调访问结构主密钥MK,公共参数PK;除了中的属性(假如可以高效的查询),剩下的属性的否定形式在中,则该算法将为用户生成私钥,利用线性秘密分享技术(LSSS)可以获得秘密α的分享值{λi},并且为每个属性标志i选择对于任意的i,属性是积极的,计算:细粒度撤销是作用于积极属性集合上;随机选择计算: 接着输出积极属性x的部分私钥:对于任意的i,属性是否定的,计算:接着输出否定属性x′的部分私钥:对所有的i,私钥D是由所有的Di组成。private key generation The algorithm accepts three parameters: non-monotonic access structure Master key MK, public parameter PK; except Attributes in (if they can be queried efficiently), the negative forms of the remaining attributes are in , then the algorithm will generate a private key for the user, and use the linear secret sharing technique (LSSS) to obtain the shared value {λ i } of the secret α, and select For any i, the property is active, calculate: Fine-grained undo is applied to active attribute sets; random selection calculate: Then output the partial private key of positive attribute x: For any i, the property is negative, compute: Then output the partial private key of the negated attribute x′: For all i, the private key D is composed of all D i .
图4示出本发明用户解密的流程图。Fig. 4 shows the flowchart of user decryption in the present invention.
解密Decryption(E,D):该算法接受两个参数:密文E,密钥D;Decryption Decryption(E, D): This algorithm accepts two parameters: ciphertext E, key D;
令利用LSSS可以得到一个系数集合Ω={ωi}i∈I,满足Σi∈Iωiλi=α(λi,α在解密部分是未知的)。make Using LSSS, a coefficient set Ω={ω i } i∈I can be obtained, which satisfies Σ i∈I ω i λ i =α(λ i , α is unknown in the decryption part).
对于任意积极属性i,即计算:对于任意否定属性i,即令有计算拉格朗日系数该系数集合满足然后计算:For any positive attribute i, that is calculate: For any negative attribute i, that is make Have Calculate Lagrangian coefficients The set of coefficients satisfies Then calculate:
进行撤销验证计算,令对于任意x∈L,计算:To perform the revocation verification calculation, let For any x ∈ L, compute:
最后利用上述计算结果进行解密,令计算:Finally, the above calculation results are used to decrypt, so that calculate:
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610486535.3A CN105978895A (en) | 2016-06-28 | 2016-06-28 | Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610486535.3A CN105978895A (en) | 2016-06-28 | 2016-06-28 | Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105978895A true CN105978895A (en) | 2016-09-28 |
Family
ID=57020757
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610486535.3A Pending CN105978895A (en) | 2016-06-28 | 2016-06-28 | Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105978895A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106549758A (en) * | 2016-12-09 | 2017-03-29 | 四川师范大学 | Support the encryption method based on attribute of non-monotonic access structure |
CN107426187A (en) * | 2017-06-27 | 2017-12-01 | 江苏大学 | A kind of in-vehicle network fine granularity mandate access method based on ECU identity attributes |
CN108880798A (en) * | 2018-06-28 | 2018-11-23 | 西南交通大学 | A kind of attribute base weight encryption method for realizing the revocation of fine granularity attribute |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297227A (en) * | 2013-07-02 | 2013-09-11 | 西安电子科技大学 | Attribute-based encryption supporting flexible and direct-revocatory ciphertext policy |
CN105071937A (en) * | 2015-07-14 | 2015-11-18 | 河海大学 | Ciphertext poly attribute base encryption method having efficient attribute revocation capability |
-
2016
- 2016-06-28 CN CN201610486535.3A patent/CN105978895A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297227A (en) * | 2013-07-02 | 2013-09-11 | 西安电子科技大学 | Attribute-based encryption supporting flexible and direct-revocatory ciphertext policy |
CN105071937A (en) * | 2015-07-14 | 2015-11-18 | 河海大学 | Ciphertext poly attribute base encryption method having efficient attribute revocation capability |
Non-Patent Citations (2)
Title |
---|
RAFAIL OSTROVSKY,ET AL.: "Attribute-Based Encryption with Non-Monotonic Access Structures", 《PROCEEDING OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY》 * |
王鹏翩 等: "一种支持完全细粒度属性撤销的CP-ABE方案", 《软件学报》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106549758A (en) * | 2016-12-09 | 2017-03-29 | 四川师范大学 | Support the encryption method based on attribute of non-monotonic access structure |
CN106549758B (en) * | 2016-12-09 | 2019-07-30 | 四川师范大学 | Support the encryption method based on attribute of non-monotonic access structure |
CN107426187A (en) * | 2017-06-27 | 2017-12-01 | 江苏大学 | A kind of in-vehicle network fine granularity mandate access method based on ECU identity attributes |
CN108880798A (en) * | 2018-06-28 | 2018-11-23 | 西南交通大学 | A kind of attribute base weight encryption method for realizing the revocation of fine granularity attribute |
CN108880798B (en) * | 2018-06-28 | 2020-11-03 | 西南交通大学 | Attribute basis weight encryption method for realizing fine-grained attribute revocation |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114039790B (en) | A fine-grained cloud storage security access control method based on blockchain | |
Li et al. | Full verifiability for outsourced decryption in attribute based encryption | |
CN107483198B (en) | A Supervisable Blockchain System and Method | |
Li et al. | TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage | |
CN104113408B (en) | It is a kind of realize the revocation of timely user property based on ciphertext policy ABE encryption method | |
CN108881314B (en) | Privacy protection method and system based on CP-ABE ciphertext under fog computing environment | |
Guo et al. | TABE-DAC: Efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain | |
CN102624522B (en) | A kind of key encryption method based on file attribute | |
CN109711184B (en) | A block chain data access control method and device based on attribute encryption | |
CN104363215B (en) | A kind of encryption method and system based on attribute | |
CN105049430B (en) | A kind of ciphertext policy ABE base encryption method with efficient user revocation | |
CN108512662A (en) | The hiding multimachine structure encryption method of support policy on a kind of lattice | |
CN104022869B (en) | Data fine-grained access control method based on key burst | |
CN106161428B (en) | A kind of ciphertext can comparison of equalization encryption attribute method | |
CN105100083B (en) | An attribute-based encryption method and system that protects privacy and supports user revocation | |
CN103618728A (en) | Attribute-based encryption method for multiple authority centers | |
Jin et al. | A secure and lightweight data access control scheme for mobile cloud computing | |
CN107968780A (en) | A kind of method for secret protection of mobile cloud storage shared data | |
CN103618729A (en) | Multi-mechanism hierarchical attribute-based encryption method applied to cloud storage | |
CN106059763A (en) | Attribute-based multi-mechanism hierarchical ciphertext-policy weight encryption method under cloud environment | |
CN108777623A (en) | A kind of revocable public key encryption method based on fuzzy keyword searching | |
CN111859444A (en) | A blockchain data supervision method and system based on attribute encryption | |
CN109714157B (en) | SDN cross-domain access control method for resisting encryption of key exposure attribute | |
CN108989037A (en) | A kind of more authorization attribute base encryption methods, system, equipment and computer media | |
CN101707524B (en) | Method for encrypting public key broadcasts with hierarchical relationship |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160928 |
|
RJ01 | Rejection of invention patent application after publication |