CN106549758A - Support the encryption method based on attribute of non-monotonic access structure - Google Patents

Support the encryption method based on attribute of non-monotonic access structure Download PDF

Info

Publication number
CN106549758A
CN106549758A CN201611130086.5A CN201611130086A CN106549758A CN 106549758 A CN106549758 A CN 106549758A CN 201611130086 A CN201611130086 A CN 201611130086A CN 106549758 A CN106549758 A CN 106549758A
Authority
CN
China
Prior art keywords
attribute
access structure
node
structure tree
leaf node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611130086.5A
Other languages
Chinese (zh)
Other versions
CN106549758B (en
Inventor
冯朝胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Normal University
Original Assignee
Sichuan Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Normal University filed Critical Sichuan Normal University
Priority to CN201611130086.5A priority Critical patent/CN106549758B/en
Publication of CN106549758A publication Critical patent/CN106549758A/en
Application granted granted Critical
Publication of CN106549758B publication Critical patent/CN106549758B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Algebra (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of encryption method based on attribute for supporting non-monotonic access structure, including initialization, generation private key for user, encryption and decryption.The present invention provide the non-monotonic access structure of support the encryption method based on attribute, to access strategy in institute the attribute for carrying out inverse in need all encode, formation encoded attributes.In non-monotonic access structure tree, every attribute for inverse occur all is substituted with encoded attributes.In the private key subitem of user, the not only corresponding private key subitem of logical attribute, also the key subitem of encoded attributes.Generate different from the private key subitem of logical attribute when private key distributes, the private key subitem of encoded attributes is generated according to the needs dynamic of decryption in decryption phase.The present invention provides the encryption method based on attribute, supports non-monotonic access structure, and will not reduce the safety of AES.

Description

Support the encryption method based on attribute of non-monotonic access structure
Technical field
The present invention relates to file ciphering technology field, and in particular to it is a kind of support non-monotonic access structure based on attribute Encryption method.
Background technology
Due to the advantage that once encryption, many people share, as a kind of Cryptograph Sharing algorithm, the encryption based on attribute (CP-ABE, Cipher Policy Attribute Based Encryption) algorithm is received significant attention.However, may be used The CP-ABE algorithms of enforcement, nearly all only support dull access structure.Only only a few supports the side of non-monotonic access structure Case, as excessively complexity often only cannot application implementation with theory significance.Non-monotonic access structure cannot be supported, it is meant that Access strategy or access logical expression cannot support NOT logic computing.And in many practical applications, NOT logic computing is must Indispensable.Non-monotonic access structure is not supported, the range of application of scheme is seriously limited.
The content of the invention
To be solved by this invention is the problem that the existing AES based on attribute does not support non-monotonic access structure.
The present invention is achieved through the following technical solutions:
A kind of encryption method based on attribute for supporting non-monotonic access structure, including:
Initialization:Security parameter d is set;Authorized organization selects a rank for the Bilinear Groups G of Big prime p0And G1, remember G0Generation Unit is g, and corresponding bilinear map is e:G0×G0→G1;Logical attribute collection needed for definition system is combined into A={ a1,a2,…,an, it is The corresponding encoded attributes collection of logical attribute set A needed for system is combined into Define a hash function H:{0,1}*→G0;Random selectionWherein,For in the residue class set of Big prime p with big element The set that number p coprime element is constituted;By system public key information It is sent to Cloud Server open, the main private key MK={ g of the secret preservation of data ownerα12};
Generate private key for user:Define and give user UiThe logical attribute collection of distribution is combined intoCorresponding encoded attributes set ForRandom selectionFor each element aj∈ w, random selectionGenerate private key
Encryption:Data owner builds the access knot that all leaf nodes all represent logical attribute according to logical expression is accessed Broussonetia papyrifera T';It transform access structure tree T' as access structure tree T that leaf node represents logical attribute or encoded attributes;To access knot Broussonetia papyrifera T each leaf node assignmentWherein, LT'Represent the set of the leaf node of access structure tree T';Generate plaintext M Shared cryptograph is Wherein, att () is for asking the corresponding attribute of leaf node, NOTTFor institute in access structure tree T The set for having non-attribute corresponding node to constitute, Ql(0) it is the polynomial constant term of leaf node l correspondences, Qx(0) it is leaf node x The polynomial constant term of correspondence;
Decryption:
For logical attribute leaf node x,
For encoded attributes leaf node x,
For NOT node x,Its In, child nodes of the z for NOT node x, whereQz(0)=Qx(0);
For operator is non-leaf nodes x of AND,
Wherein, sxFor operator for AND non-leaf nodes x child nodes set, The seniority among brothers and sisters sequence number that index (z) is leaf node z in the brotgher of node, father nodes of the parent (z) for leaf node z, Qx(0) For the polynomial constant term of non-leaf nodes x correspondence;
Ciphertext data M is as follows:
Optionally, data owner builds the visit that all leaf nodes all represent logical attribute according to logical expression is accessed Ask that structure tree T' includes:
In access structure tree T', each leaf node represents an attribute in community set, and its threshold value is 1;
In access structure tree T', each non-leaf nodes plays thresholding effect.
Optionally, it transform access structure tree T' as access structure trees that leaf node represents logical attribute or encoded attributes T includes:
The leaf node of scanning access structure tree T', it is determined whether there is non-attribute;
If it is non-attribute that leaf node is corresponding, leaf node is substituted with encoded attributes node.
Optionally, the coded system of encoded attributes node is:The corresponding property value of attribute of the entitled B of attribute can be arranged and number For n, 2k-1≤n≤2k, k is positive integer, all values of B is carried out with coding successively using k bits and forms coding category Property, encoded attributes is respectively designated as B from low level to a high position1、B2、…、Bk
Optionally, it is each leaf node assignment of access structure tree TIncluding:
A polynomial of one indeterminate function is randomly choosed for non-leaf nodes x of each operator in access structure tree T for AND Qx(x);
Random selectionThe corresponding privacy sharing number of root node for making access structure tree T is Qr(0)=s;
For arbitrary node y and his father's node operator are AND, Qy(0)=Qparent(y)(index (y)), wherein, The seniority among brothers and sisters sequence number that index (y) is arbitrary node y in the brotgher of node;
For arbitrary node y and his father's node operator are OR, Qy(0)=Qparent(y)(0)。
The present invention compared with prior art, has the following advantages and advantages:
The encryption method based on attribute of the non-monotonic access structure of support that the present invention is provided, can arrange denumerable using property value The characteristics of property value is encoded, form encoded attributes, logic-based attribute and encoded attributes are encrypted.This method is to visiting Ask in strategy the attribute (referred to as non-attribute) for carrying out inverse in need all encoded, form encoded attributes.In non-list Visit and investigate in asking structure tree, every attribute for inverse occur all is substituted with encoded attributes.In the private key subitem of user In, the not only corresponding private key subitem of logical attribute, also the key subitem of encoded attributes.Exist with the private key subitem of logical attribute Difference is generated when private key distributes, the private key subitem of encoded attributes is generated according to the needs dynamic of decryption in decryption phase.The present invention Encryption method based on attribute is provided, is supported non-monotonic access structure, and the safety of AES will not be reduced.
Description of the drawings
Accompanying drawing described herein is used for providing further understanding the embodiment of the present invention, constitutes of the application Point, do not constitute the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is the structural representation of logic-based attribute access structure tree;
Fig. 2 is the structural representation of logic-based attribute and encoded attributes access structure tree.
Specific embodiment
To make the object, technical solutions and advantages of the present invention become more apparent, with reference to embodiment and accompanying drawing, to this Invention is described in further detail, and the exemplary embodiment of the present invention and its explanation are only used for explaining the present invention, do not make For limitation of the invention.
Embodiment
Using access structure tree table, up in the AES based on attribute of access strategy, Cryptograph Sharing is by will be secret Close number shares what is realized on the leaf node of tree.It should be noted that each leaf node has and only and represents a category Property value.If occurring in that the non-of certain attribute in the access logical expression for representing access strategy, hereinafter referred to as non-attribute, that Will there is the non-attribute leaf node for representing multiple attribute values in the access structure tree that formed by the expression formula.The node Cannot match with any single attribute, therefore corresponding ciphertext subitem cannot be formed.The direct thinking for solving the problem is by this Property value is substituted with the non-all other property value of the property value is become, the relation of these property values be all logic or.However, category The more value of property causes the method infeasible, and in the case where attribute has 1000 values, the non-of any property value all needs Substituted with 999 property values.Because attribute value is more, it is meant that the memory space that access structure tree and ciphertext need is got over Greatly, encrypt and decrypt the time for spending longer.For this problem, inventor consider with binary coding is carried out to property value with Reduce the quantity of non-property value.
If the corresponding property value of attribute of the entitled B of attribute can be arranged and number is n, if 2k-1≤n≤2k, then, it is possible to With k bits all values of B are carried out with coding successively and forms encoded attributes, encoded attributes is ordered to a high position respectively from low level Entitled B1、B2、…、Bk, k is positive integer.For example, there are 15 classes in a grade, because of 24-1≤15≤24, so representing the category of class Property class encoded attributes name be respectively class1, class2, class3 and class4.The corresponding volumes of attribute class=11 Code attribute is respectively:Class1=1, class2=1, class3=0 and class4=1, are abbreviated as class= Class4class3class2class1=1011.
After using above coded method, the non-of attribute is asked just to become simple.If attribute B=Bk…B2B1, then,Due to BiThe value of (1≤i≤k) is 0 or 1, often Individual non-attribute!BiLeaf node all corresponds to a property value, can calculate corresponding ciphertext subitem.Attribute class=11's is non- That is class ≠ 11, corresponding encoded attributes is:Class=!class4∪!class3∪!class2∪!Class1=1011. The structural representation of logic-based attribute access structure tree is as shown in figure 1, be changed into logic-based attribute and encoded attributes access The structural representation of structure tree is as shown in Figure 2.Obviously, when attribute value reaches as many as 1000, any non-attribute is all only not Cross and correspond to 10 encoded attributes values and 10 corresponding leaf nodes.
Based on above-mentioned analysis, the present invention will constitute the base attribute of composite attribute when private key for user is generated with cryptogram computation Bound, proposed a kind of encryption method based on attribute for supporting many-valued distribution and combinations of attributes, including initialization, generation are used Family private key, four steps of encryption and decryption.
Initialization:Security parameter d is set;Authorized organization selects a rank for the Bilinear Groups G of Big prime p0And G1, remember G0 Generation unit be g, corresponding bilinear map be e:G0×G0→G1;Logical attribute collection needed for definition system is combined into A={ a1, a2,…,an, the corresponding encoded attributes collection of logical attribute set A needed for system is combined intoDefine a hash function H:{0,1}*→G0; Random selectionWherein,For the set that element coprime with Big prime p in the residue class set of Big prime p is constituted; By system public key informationIt is sent to Cloud Server simultaneously Open, data owner is secret to preserve main private key MK={ gα12}.;
Generate private key for user:Define and give user UiThe logical attribute collection of distribution is combined intoCorresponding encoded attributes set ForRandom selectionFor each element aj∈ w, random selectionGenerate private key
Encryption:Data owner builds the access knot that all leaf nodes all represent logical attribute according to logical expression is accessed Broussonetia papyrifera T';It transform access structure tree T' as access structure tree T that leaf node represents logical attribute or encoded attributes;To access knot Broussonetia papyrifera T each leaf node assignmentWherein, LT'Represent the set of the leaf node of access structure tree T';Generate plaintext M Shared cryptograph is Wherein, att () is for asking the corresponding attribute of leaf node, NOTTFor institute in access structure tree T The set for having non-attribute corresponding node to constitute, Ql(0) it is the polynomial constant term of leaf node l correspondences, Qx(0) it is leaf node x The polynomial constant term of correspondence.
Specifically, privacy sharing is carried out for convenience, will be accessed logical expression access structure tree T' and is represented.Accessing knot In Broussonetia papyrifera T', each leaf node represents an attribute in attribute space, and its threshold value is 1, and each non-leaf nodes rises Thresholding is acted on.If using num respectivelyxAnd kxRepresent child's number and threshold value of non-leaf nodes x, then there must be 0 < kx≤ numx.When the thresholding of non-leaf nodes is prescribed a time limit for AND-gate, its threshold value kx=numx;When the thresholding of non-leaf nodes is OR, Threshold value kx=1.
The leaf node of scanning access structure tree T', it is determined whether there is non-attribute.If certain leaf node is corresponding being Non- attribute, the leaf node is substituted with corresponding encoded attributes node.
If the root node of access structure tree T is r, TxRepresent subtree of the root node for x, it is clear that have:T=Tr.If property setMeet access control tree Tx, it is designated as Tx(γ)=1.Calculating can be carried out by following mode recurrence:As x is Non-leaf nodes, is that all child nodes x' of the non-leaf nodes calculate Tx'(γ), and if only if at least kxThe T of individual childx' (γ) when return value is all 1, Tx(γ)=1;If x is leaf node, when the attribute of and if only if leaf node x belongs to γ, Tx (γ)=1.
For each leaf node assignment of access structure tree TIt is according to carrying out from top to bottom.Specifically, it is to access knot In Broussonetia papyrifera T, each operator randomly chooses a polynomial of one indeterminate function Q for non-leaf nodes x of ANDx(x).Random selectionThe corresponding privacy sharing number of root node for making access structure tree T is Qr(0)=s.For arbitrary node y and its father node Operator is AND, Qy(0)=Qparent(y)(index (y)), wherein, rows of the index (y) for arbitrary node y in the brotgher of node Row sequence number (is numbered by order from left to right);For arbitrary node y and his father's node operator are OR, Qy(0)= Qparent(y)(0)。
Decryption:
For logical attribute leaf node x, aj=att (x),
For encoded attributes leaf node x,If UkMeet the coding of access structure tree T Attribute (if multiple encoded attributeses meet a non-attribute, only taking one of them) collection is combined into S', UkBy private key subitem It is sent to authorized organization's request temporary private subitem and mapping number.Authorized organization randomly choosesFor each element aj∈ S', random selectionGenerate following temporary private subitem: Mapping number of authorized organization's calculation code attribute to logical attribute:
Then temporary private subitem and mapping number are sent back to into Uk, UkAccording to same logical attribute leaf node decipherment algorithm one The algorithm decryption encoded attributes leaf node of sample.For encoded attributes leaf node x, its decrypted result is:
For NOT node x,Its In, child nodes of the z for NOT node x, whereQz(0)=Qx(0);
For operator is non-leaf nodes x of AND,
Wherein, sxFor operator for AND non-leaf nodes x child nodes set, The seniority among brothers and sisters sequence number for being leaf node z in the brotgher of node, father nodes of the parent (z) for leaf node z, Qx(0) it is non-leaf The polynomial constant term of node x correspondences;
Ciphertext data M is as follows:
Above-described specific embodiment, has been carried out further to the purpose of the present invention, technical scheme and beneficial effect Describe in detail, the be should be understood that specific embodiment that the foregoing is only the present invention is not intended to limit the present invention Protection domain, all any modification, equivalent substitution and improvements within the spirit and principles in the present invention, done etc. all should include Within protection scope of the present invention.

Claims (5)

1. a kind of encryption method based on attribute for supporting non-monotonic access structure, it is characterised in that include:
Initialization:Security parameter d is set;Authorized organization selects a rank for the Bilinear Groups G of Big prime p0And G1, remember G0Generation unit be G, corresponding bilinear map are e:G0×G0→G1;Logical attribute collection needed for definition system is combined into A={ a1,a2,…,an, system institute The corresponding encoded attributes collection of logical attribute set A for needing is combined into Define a hash function H:{0,1}*→G0;Random selectionWherein,For in the residue class set of Big prime p with big element The set that number p coprime element is constituted;By system public key information It is sent to Cloud Server open, the main private key MK={ g of the secret preservation of data ownerα12};
Generate private key for user:Define and give user UiThe logical attribute collection of distribution is combined intoCorresponding encoded attributes collection is combined intoRandom selectionFor each element aj∈ w, random selectionGenerate private key
Encryption:Data owner builds the access structure tree that all leaf nodes all represent logical attribute according to logical expression is accessed T';It transform access structure tree T' as access structure tree T that leaf node represents logical attribute or encoded attributes;For access structure tree T each leaf node assignmentWherein, LT'Represent the set of the leaf node of access structure tree T';Generate being total to for plaintext M Enjoying ciphertext is Wherein, att () is for asking the corresponding attribute of leaf node, NOTTFor institute in access structure tree T The set for having non-attribute corresponding node to constitute, Ql(0) it is the polynomial constant term of leaf node l correspondences, Qx(0) it is leaf node x The polynomial constant term of correspondence;
Decryption:
For logical attribute leaf node x,
For encoded attributes leaf node x,
For NOT node x,Wherein, z is The child nodes of NOT node x, whereQz(0)=Qx(0);
For operator is non-leaf nodes x of AND,
D e c N o d e ( x ) = Π z ∈ s x D e c N o d e ( z ) Δ i , s x ′ ( 0 ) , where s x ′ = { i n d e x ( z ) : z ∈ s x } i = i n d e x ( z ) = Π z ∈ s x ( e ( g , g ) r k · Q z ( 0 ) ) Δ i , s x ′ ( 0 ) = Π z ∈ s x ( e ( g , g ) r k · Q p a r e n t ( z ) ( i n d e x ( z ) ) ) Δ i , s x ′ ( 0 ) = Π z ∈ s x e ( g , g ) r k · Q x ( i ) · Δ i , s x ′ ( 0 ) = e ( g , g ) r k · Q x ( 0 )
Wherein, sxFor operator for AND non-leaf nodes x child nodes set, The seniority among brothers and sisters sequence number that index (z) is leaf node z in the brotgher of node, father nodes of the parent (z) for leaf node z, Qx(0) For the polynomial constant term of non-leaf nodes x correspondence;
Ciphertext data M is as follows:
D e c r y p t ( C T , S K ) = C ~ · D e c N o d e ( r o o t ) e ( C , SK k ( 1 ) ) = M · e ( g , g ) α s · e ( g , g ) r k s e ( g β 1 s , g α + r k β 1 ) = M .
2. the encryption method based on attribute for supporting non-monotonic access structure according to claim 1, it is characterised in that number Included according to the access structure tree T' that all leaf nodes of access logical expression structure all represent logical attribute according to the owner:
In access structure tree T', each leaf node represents an attribute in community set, and its threshold value is 1;
In access structure tree T', each non-leaf nodes plays thresholding effect.
3. the encryption method based on attribute for supporting non-monotonic access structure according to claim 2, it is characterised in that will Access structure tree T' transform leaf node as and represents logical attribute or the access structure tree T of encoded attributes and includes:
The leaf node of scanning access structure tree T', it is determined whether there is non-attribute;
If it is non-attribute that leaf node is corresponding, leaf node is substituted with encoded attributes node.
4. the encryption method based on attribute for supporting non-monotonic access structure according to claim 3, it is characterised in that compile Code attribute node coded system be:The corresponding property value of attribute of the entitled B of attribute can arrange and number be n, 2k-1≤n≤2k, k For positive integer, coding is carried out successively to all values of B using k bits and forms encoded attributes, encoded attributes is from low level B is respectively designated as to a high position1、B2、…、Bk
5. the encryption method based on attribute for supporting non-monotonic access structure according to claim 2, it is characterised in that be Access structure tree T each leaf node assignmentIncluding:
A polynomial of one indeterminate function Q is randomly choosed for non-leaf nodes x of each operator in access structure tree T for ANDx (x);
Random selectionThe corresponding privacy sharing number of root node for making access structure tree T is Qr(0)=s;
For arbitrary node y and his father's node operator are AND, Qy(0)=Qparent(y)(index (y)), wherein, index (y) The seniority among brothers and sisters sequence number for being arbitrary node y in the brotgher of node;
For arbitrary node y and his father's node operator are OR, Qy(0)=Qparent(y)(0)。
CN201611130086.5A 2016-12-09 2016-12-09 Support the encryption method based on attribute of non-monotonic access structure Active CN106549758B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611130086.5A CN106549758B (en) 2016-12-09 2016-12-09 Support the encryption method based on attribute of non-monotonic access structure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611130086.5A CN106549758B (en) 2016-12-09 2016-12-09 Support the encryption method based on attribute of non-monotonic access structure

Publications (2)

Publication Number Publication Date
CN106549758A true CN106549758A (en) 2017-03-29
CN106549758B CN106549758B (en) 2019-07-30

Family

ID=58397226

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611130086.5A Active CN106549758B (en) 2016-12-09 2016-12-09 Support the encryption method based on attribute of non-monotonic access structure

Country Status (1)

Country Link
CN (1) CN106549758B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113489591A (en) * 2021-06-04 2021-10-08 杭州师范大学 Traceable comparison attribute encryption method based on multiple authorization centers
US11316662B2 (en) * 2018-07-30 2022-04-26 Koninklijke Philips N.V. Method and apparatus for policy hiding on ciphertext-policy attribute-based encryption

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140033573A (en) * 2012-09-03 2014-03-19 경희대학교 산학협력단 Data delegation method for public cloud storage service and data access method for the delegated data
KR20140062745A (en) * 2012-11-15 2014-05-26 고려대학교 산학협력단 System of attribute-based encryption and method thereof
CN105897709A (en) * 2016-04-01 2016-08-24 西安电子科技大学 User attribute encryption and decryption method of non-monotonic access structure in distributed network
CN105978895A (en) * 2016-06-28 2016-09-28 电子科技大学 Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation
CN105991278A (en) * 2016-07-11 2016-10-05 河北省科学院应用数学研究所 Ciphertext access control method based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption)
CN106131139A (en) * 2016-06-23 2016-11-16 暨南大学 The encryption of the floating data of a kind of cloud relational database and querying method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140033573A (en) * 2012-09-03 2014-03-19 경희대학교 산학협력단 Data delegation method for public cloud storage service and data access method for the delegated data
KR20140062745A (en) * 2012-11-15 2014-05-26 고려대학교 산학협력단 System of attribute-based encryption and method thereof
CN105897709A (en) * 2016-04-01 2016-08-24 西安电子科技大学 User attribute encryption and decryption method of non-monotonic access structure in distributed network
CN106131139A (en) * 2016-06-23 2016-11-16 暨南大学 The encryption of the floating data of a kind of cloud relational database and querying method
CN105978895A (en) * 2016-06-28 2016-09-28 电子科技大学 Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation
CN105991278A (en) * 2016-07-11 2016-10-05 河北省科学院应用数学研究所 Ciphertext access control method based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11316662B2 (en) * 2018-07-30 2022-04-26 Koninklijke Philips N.V. Method and apparatus for policy hiding on ciphertext-policy attribute-based encryption
CN113489591A (en) * 2021-06-04 2021-10-08 杭州师范大学 Traceable comparison attribute encryption method based on multiple authorization centers
CN113489591B (en) * 2021-06-04 2023-09-12 杭州师范大学 Traceable comparison attribute encryption method based on multiple authorization centers

Also Published As

Publication number Publication date
CN106549758B (en) 2019-07-30

Similar Documents

Publication Publication Date Title
US11425171B2 (en) Method and system for cryptographic attribute-based access control supporting dynamic rules
CN104363215B (en) A kind of encryption method and system based on attribute
CN103701833B (en) A kind of ciphertext access control method and system based on cloud computing platform
Zaghloul et al. P-MOD: Secure privilege-based multilevel organizational data-sharing in cloud computing
CN105100083B (en) A kind of secret protection and support user's revocation based on encryption attribute method and system
CN106127075A (en) The encryption method of can search for based on secret protection under a kind of cloud storage environment
CN108512662A (en) The hiding multimachine structure encryption method of support policy on a kind of lattice
CN108494768A (en) A kind of cipher text searching method and system for supporting access control
CN111143471B (en) Ciphertext retrieval method based on blockchain
CN107070660A (en) A kind of design Storage method of block chain encrypted radio-frequency chip
CN104135473B (en) A kind of method that identity base broadcast enciphering is realized by the attribute base encryption of Ciphertext policy
CN103731432A (en) Multi-user supported searchable encryption system and method
CN110390203B (en) Strategy hidden attribute-based encryption method capable of verifying decryption authority
CN106506155A (en) Cryptograph Sharing method under publicly-owned cloud environment
CN106407681B (en) A kind of cloud system environment individual health record storage access method
CN109740364A (en) The cipher text searching method based on attribute of controllable search permission
JP2016526851A (en) System for sharing encryption keys
CN106686010A (en) Multi-mechanism attribute-based encryption method supporting strategy dynamic updating
CN107276766A (en) A kind of many authorization attribute encipher-decipher methods
CN108600174A (en) A kind of access control mechanisms and its implementation of big merger network
Hao et al. Efficient attribute-based access control with authorized search in cloud storage
Aruna et al. Medical healthcare system with hybrid block based predictive models for quality preserving in medical images using machine learning techniques
CN106549758B (en) Support the encryption method based on attribute of non-monotonic access structure
CN106209354A (en) A kind of support attribute hide can verify that attribute base encrypt outsourcing scheme
CN105790929A (en) High-efficient access control method based on rule redundancy elimination in encryption environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant