CN106911702B - Based on the cloud storage block encryption access control method for improving CP-ABE - Google Patents

Based on the cloud storage block encryption access control method for improving CP-ABE Download PDF

Info

Publication number
CN106911702B
CN106911702B CN201710133566.5A CN201710133566A CN106911702B CN 106911702 B CN106911702 B CN 106911702B CN 201710133566 A CN201710133566 A CN 201710133566A CN 106911702 B CN106911702 B CN 106911702B
Authority
CN
China
Prior art keywords
user
key
access control
access
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710133566.5A
Other languages
Chinese (zh)
Other versions
CN106911702A (en
Inventor
金彪
翟晓晓
熊金波
林劼
李璇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Normal University
Original Assignee
Fujian Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Normal University filed Critical Fujian Normal University
Priority to CN201710133566.5A priority Critical patent/CN106911702B/en
Publication of CN106911702A publication Critical patent/CN106911702A/en
Application granted granted Critical
Publication of CN106911702B publication Critical patent/CN106911702B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention is disclosed based on the cloud storage block encryption access control method for improving CP-ABE, access structure tree T in CP-ABE ciphering process is traversed, it obtains all user property group A being likely to occur, all user property group A is further encrypted and generate the corresponding decrypted private key of each set of properties.When user property changes, need to only re-encryption be carried out to place set of properties before oneself, without carrying out re-encryption to all properties.Key is stored in attribute authority (aa) center always, and private key does not need to be retransmitted after re-encryption, thus avoid because user it is not online caused by can not receive newest code key.By these user property group A and corresponding decrypted private key, attribute authority (aa) center is stored in using Hash table, when subscriber authentication, can directly be matched user property collection with set of properties, and the key that user receives is pseudo- key, can reduce the risk of information leakage in transmission process.

Description

Based on the cloud storage block encryption access control method for improving CP-ABE
Technical field
The present invention relates to based on the cloud storage block encryption access control method for improving CP-ABE.
Background technique
It is being based on CP-ABE cloud storage access control in the related technology at present, major defect shows themselves in that user property collection is sent out It can all lead to re-encryption after changing, when re-encryption, needs to cause the computing cost of re-encryption to increase whole attribute re-encryptions, Computational efficiency is low;Influencing property set, there is no the user of variation access;When user can miss newest code key because of not online Distribution;It is directly traversed using tree construction when authentication, efficiency is lower;It directly is distributed to private key for user, may be transmitted across Private key is revealed in journey, safety is low.
Summary of the invention
It is an object of the invention to overcome the prior art to cause defect present in re-encryption as user property change, mention For reducing the computing cost of re-encryption based on the cloud storage block encryption access control method for improving CP-ABE, key point is avoided User does not miss the case where reception online when hair, improves the efficiency of subscriber authentication, solves the safety in private key transmission process Property problem, it is insufficient.
The technical solution adopted by the present invention is that:
Based on the cloud storage block encryption access control method for improving CP-ABE comprising following steps:
S1: being centrally generated open parameter PK and master key MK by attribute authority (aa), and open parameter PK be distributed to user, and Master key MK is stored in attribute authority (aa) center;
S2: data subject obtains data ciphertext CT using open parameter PK and access structure T encryption data plaintext M, and will Data ciphertext CT is uploaded to resource management center;
S3: attribute authority (aa) center obtain access structure T, and carry out traversal obtain it is all can be by the user property of access Group A;Due to store relation on attributes in access structure tree T and whether may have access to standard, user property group A is then that can pass through visit Any one set of properties asked, the partitioning standards of user property group A are relations on attributes in access structure tree T
S4: attribute authority (aa) center encrypts user property group A all obtained in step S3 using master key MK respectively The corresponding private key SK of each user property group A is obtained, and is saved user property group A and corresponding private key SK using Hash table;
S5: user issues access application to access control authentication points and resource management center respectively;
S6: access control authentication points extract user's symbolic animal of the birth year collection from the application that user issues, and generate encryption and decryption The user property collection and parameter P are sent to attribute authority (aa) center by the parameter P of private key jointly;
S7: attribute authority (aa) central authentication user identity;
The property set of user itself can be matched with what traversal in S3 obtained by the set of properties of access, if Pass through with unanimously i.e. authentication, matches inconsistent authentication failure.
When subscriber authentication passes through, attribute authority (aa) center issues the verifying knot being verified to access control authentication points Fruit, attribute authority (aa) center obtain the private key SK that the user corresponds to set of properties, and attribute authority (aa) center is based on private key SK and generates pseudo- key SK ' is simultaneously sent to user;
When subscriber authentication is obstructed out-of-date, to the unacceptable verification result of access control authentication points sending verifying;
S8: access control authentication points are based on whether subscriber authentication result notice resource management center sends ciphertext;
When subscriber authentication result is that verifying is obstructed out-of-date, access control authentication points notify user to access failure, access Control authentication points notice resource management center does not send data ciphertext CT to user;
When subscriber authentication result is to be verified, parameter P is sent to user, access control by access control authentication points Authentication points notify resource management center to send data ciphertext CT to user;
S9: user carries out respective handling according to access result is received:
When subscriber authentication failure, user can not access data ciphertext CT, and user accesses failure;
When subscriber authentication success, decrypts the data ciphertext CT received and obtain data clear text M.
Further, the step S7, in when subscriber authentication passes through, attribute authority (aa) center using obtain parameter P Encryption key SK obtains pseudo- key SK '.
Further, in the step S9, when subscriber authentication success, user obtains pseudo- key SK ', parameter P, number According to ciphertext CT, pseudo- key SK is decrypted using parameter P ' private key SK is obtained, user executes M=Decrypt (CT, SK), with private key SK Ciphertext data ciphertext CT obtains data clear text M.
The invention adopts the above technical scheme, traverses to the access structure tree T in CP-ABE ciphering process, obtains institute Having can be divided in the third step encryption of CP-ABE algorithm by the user property group A of access, the set of properties all to these It does not encrypt, generates the corresponding decrypted private key of each set of properties.It, only need to be to place attribute before oneself when user property changes Group carries out re-encryption, without carrying out re-encryption to all properties.Because key is stored in attribute authority (aa) center, re-encryption always Private key does not need to be retransmitted and (issues request when user needs) afterwards, thus avoid because user it is not online caused by Newest key can not be received.By these user property group A and corresponding decrypted private key, it is stored in attribute authority (aa) using Hash table The heart when subscriber authentication, can directly match user property collection with set of properties.And the key that user receives is pseudo- key, The risk of information leakage in transmission process can be further decreased.
The present invention can effectively make up these defects using CP-ABE block encryption.Using block encryption, reduce Computing cost during re-encryption, only to part set of properties re-encryption;Set of properties and private key are deposited in into symbolic animal of the birth year with Hash table Authoritative center, when authentication, directly match user property collection with set of properties, improve authentication efficiency, and because not needing The retransmission of new private key is carried out, and then it is online not need user.Present invention introduces pseudo- key, the private key avoided in transmission is let out Dew.
Detailed description of the invention
The present invention is described in further details below in conjunction with the drawings and specific embodiments;
Fig. 1 is that the present invention is based on the schematic illustrations for the cloud storage block encryption access control method for improving CP-ABE;
Fig. 2 is that the present invention is based on the flow diagrams for the cloud storage block encryption access control method for improving CP-ABE.
Specific embodiment
As shown in one of Fig. 1-2, the present invention discloses a kind of based on the cloud storage block encryption access control for improving CP-ABE Method comprising following steps:
S1: being centrally generated open parameter PK and master key MK by attribute authority (aa), and open parameter PK be distributed to user, and Master key MK is stored in attribute authority (aa) center;
S2: data subject obtains data ciphertext CT using open parameter PK and access structure T encryption data plaintext M, and will Data ciphertext CT is uploaded to resource management center;
S3: attribute authority (aa) center obtain access structure T, and carry out traversal obtain it is all can be by the user property of access Group A;Due to store relation on attributes in access structure tree T and whether may have access to standard, set of properties A can then pass through access Any one set of properties, the partitioning standards of user property group A are relations on attributes in access structure tree T.
S4: attribute authority (aa) center encrypts user property group A all obtained in step S3 using master key MK respectively The corresponding private key SK of each user property group A is obtained, and is saved user property group A and corresponding private key SK using Hash table;
S5: user issues access application to access control authentication points and resource management center respectively;
S6: access control authentication points extract user's symbolic animal of the birth year collection from the application that user issues, and generate encryption and decryption The user property collection and parameter P are sent to attribute authority (aa) center by the parameter P of private key jointly;
S7: attribute authority (aa) central authentication user identity;
The property set of user itself can be matched with what traversal in S3 obtained by the set of properties of access, if Pass through with unanimously i.e. authentication, matches inconsistent authentication failure.
When subscriber authentication passes through, attribute authority (aa) center issues the verifying knot being verified to access control authentication points Fruit, attribute authority (aa) center obtain the private key SK that the user corresponds to set of properties, and attribute authority (aa) center is based on private key SK and generates pseudo- key SK ' is simultaneously sent to user;
When subscriber authentication is obstructed out-of-date, to the unacceptable verification result of access control authentication points sending verifying;
S8: access control authentication points are based on whether subscriber authentication result notice resource management center sends ciphertext;
When subscriber authentication result is that verifying is obstructed out-of-date, access control authentication points notify user to access failure, access Control authentication points notice resource management center does not send data ciphertext CT to user
When subscriber authentication result is to be verified, parameter P is sent to user, access control by access control authentication points Authentication points notify resource management center to send data ciphertext CT to user;
S9: user carries out respective handling according to access result is received:
When subscriber authentication failure, user can not access data ciphertext CT, and user accesses failure;
When subscriber authentication success, decrypts the data ciphertext CT received and obtain data clear text M.
Further, the step S7, in when subscriber authentication passes through, attribute authority (aa) center using obtain parameter P Encryption key SK obtains pseudo- key SK '.
Further, in the step S9, when subscriber authentication success, user obtains pseudo- key SK ', parameter P, number According to ciphertext CT, pseudo- key SK is decrypted using parameter P ' private key SK is obtained, user executes M=Decrypt (CT, SK), with private key SK Ciphertext data ciphertext CT obtains data clear text M.
The invention adopts the above technical scheme, traverses to the access structure tree T in CP-ABE ciphering process, obtains institute It is possible that the user property group A occurred, the set of properties all to these add respectively in the third step encryption of CP-ABE algorithm It is close, generate the corresponding decrypted private key of each set of properties.When user property changes, only need to set of properties where before oneself into Row re-encryption, without carrying out re-encryption to all properties.It is private after re-encryption because key is stored in attribute authority (aa) center always Key does not need to be retransmitted and (issues request when user needs), thus avoid because user it is not online caused by can not Receive newest code key.By these user property group A and corresponding decrypted private key, it is stored in attribute authority (aa) center using Hash table, When subscriber authentication, directly user property collection can be matched with set of properties.And the key that user receives is pseudo- key, it can be with Further decrease the risk of information leakage in transmission process.
Specific embodiment elaborates to the present invention below
A kind of cloud storage block encryption access control method based on improvement CP-ABE comprising following steps:
S1: attribute authority (aa) center executes the open parameter PK and master key MK of Setup () generation, and will open parameter PK distribution To user, master key MK is stored in attribute authority (aa) center;
S2: data subject executes CT=Encrypt (PK, M, T), bright using open parameter PK and access structure T encryption data Literary M obtains data ciphertext CT, and data ciphertext CT is uploaded to resource management center;
S3: attribute authority (aa) center obtain access structure T, and carry out traversal obtain it is all can be by the user property of access Group A;
S4: attribute authority (aa) center executes SK=KeyGen (MK, A) and distinguishes all user properties group A obtained in step S3 Encryption obtains corresponding private key SK, and using Hash table, user property group A and corresponding private key SK is saved;
S5: user issues application to access control authentication points and resource management center;
S6: access control authentication points extract user's symbolic animal of the birth year collection from the application that user issues, and generate encryption and decryption User property collection and parameter P are sent to attribute authority (aa) center by the parameter P of private key jointly;
S7: attribute authority (aa) central authentication user identity;
When subscriber authentication passes through, attribute authority (aa) center issues the verifying knot being verified to access control authentication points Fruit, attribute authority (aa) center obtain the private key SK that the user corresponds to set of properties, and attribute authority (aa) center is based on private key SK and generates pseudo- key SK ' is simultaneously sent to user;Specifically attribute authority (aa) center obtains pseudo- key SK using encryption parameter P encryption key SK is obtained ';
When subscriber authentication is obstructed out-of-date, attribute authority (aa) center issues to access control authentication points and verifies unacceptable test Demonstrate,prove result;
S8: access control authentication points are based on whether subscriber authentication result notice resource management center sends ciphertext;
When subscriber authentication result is that verifying is obstructed out-of-date, access control authentication points notify user to access failure, access Control authentication points notice resource management center does not send data ciphertext CT to user;
When subscriber authentication result is to be verified, parameter P is sent to user, access control by access control authentication points Authentication points notify resource management center to send data ciphertext CT to user;
S9: user carries out respective handling according to access result is received:
When subscriber authentication failure, user can not access data ciphertext CT, and user accesses failure;
When subscriber authentication success, user obtains SK ', P, CT, obtains private key SK using P decryption SK ', user executes M=Decrypt (CT, SK) decrypts ciphertext CT with private key SK, obtains data clear text M.
In conclusion the invention adopts the above technical scheme, traverse access structure T, obtain it is all can be by access User property group A, and all properties group is encrypted to obtain private key, by these set of properties and corresponding private key, with Kazakhstan Uncommon table is stored in attribute authority (aa) center, reduces since the variation of user identity attribute causes the computing cost of re-encryption;User When attribute changes, need to only re-encryption be carried out to place set of properties before the user, not need to carry out whole set of properties weight It is retransmitted after new encryption to whole users, private key does not need to distribute again after re-encryption, and it is online without user, and then avoid The case where user does not miss reception online when code key is distributed improves the efficiency of subscriber authentication, solves in private key transmission process Safety issue.

Claims (1)

1. based on improve CP-ABE cloud storage block encryption access control method, it is characterised in that: itself the following steps are included:
S1: open parameter PK and master key MK is centrally generated by attribute authority (aa), and open parameter PK is distributed to user, and master is close Key MK is stored in attribute authority (aa) center;
S2: data subject is counted using open parameter PK and access structure T by asymmet-ric encryption method encryption data plaintext M Resource management center is uploaded to according to ciphertext CT, and by data ciphertext CT;
S3: attribute authority (aa) center obtain access structure T, and carry out traversal obtain it is all can be by the user property group A of access;
S4: attribute authority (aa) center encrypts user property group A all obtained in step S3 respectively using master key MK and obtains The corresponding private key SK of each user property group A, and saved user property group A and corresponding private key SK using Hash table;
S5: user issues access application to access control authentication points and resource management center respectively;
S6: access control authentication points extract user property collection from the application that user issues, and generate encryption and decrypted private key The user property collection and parameter P are sent to attribute authority (aa) center by parameter P jointly;
S7: attribute authority (aa) central authentication user identity;
User property collection can be matched with what traversal in S3 obtained by the set of properties A of access;When matching consistent, use Family authentication passes through;When matching inconsistent, subscriber authentication does not pass through;
When subscriber authentication passes through, attribute authority (aa) center issues the verification result being verified to access control authentication points, Attribute authority (aa) center obtains the corresponding private key SK of user property group A, and attribute authority (aa) center is passed through symmetrical using the parameter P obtained Encryption key SK obtains pseudo- key SK ' and it is sent to user;
When subscriber authentication is obstructed out-of-date, to the unacceptable verification result of access control authentication points sending verifying;
S8: access control authentication points are based on whether subscriber authentication result notice resource management center sends ciphertext;
When subscriber authentication result is that verifying is obstructed out-of-date, access control authentication points notify user to access failure, access control Authentication points notice resource management center does not send data ciphertext CT to user;
When subscriber authentication result is to be verified, parameter P is sent to user, access control certification by access control authentication points Point notice resource management center sends data ciphertext CT to user;
S9: user carries out respective handling according to access result is received:
When subscriber authentication failure, user can not access data ciphertext CT, and user accesses failure;
When subscriber authentication success, decrypts the data ciphertext CT received and obtain data clear text M;
Specifically, when subscriber authentication success, user obtains pseudo- key SK ', parameter P, data ciphertext CT, due to symmetrically plus Close characteristic decrypts pseudo- key SK using parameter P ' private key SK can be obtained;And due to the asymmetric encryption characteristic of plaintext M, user is held Data clear text M can be obtained with private key SK ciphertext data ciphertext CT in row M=Decrypt (CT, SK), wherein Decrypt (CT, It SK is) the corresponding decryption function of asymmet-ric encryption method in S2.
CN201710133566.5A 2017-03-08 2017-03-08 Based on the cloud storage block encryption access control method for improving CP-ABE Active CN106911702B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710133566.5A CN106911702B (en) 2017-03-08 2017-03-08 Based on the cloud storage block encryption access control method for improving CP-ABE

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710133566.5A CN106911702B (en) 2017-03-08 2017-03-08 Based on the cloud storage block encryption access control method for improving CP-ABE

Publications (2)

Publication Number Publication Date
CN106911702A CN106911702A (en) 2017-06-30
CN106911702B true CN106911702B (en) 2019-08-02

Family

ID=59187104

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710133566.5A Active CN106911702B (en) 2017-03-08 2017-03-08 Based on the cloud storage block encryption access control method for improving CP-ABE

Country Status (1)

Country Link
CN (1) CN106911702B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107947923B (en) * 2017-11-29 2020-08-04 重庆邮电大学 Attribute key distribution method without trusted center
CN109254872A (en) * 2018-08-14 2019-01-22 贵州仰望星空科技有限公司 A kind of security access system for education big data
CN109246096B (en) * 2018-08-30 2021-05-18 西安电子科技大学 Multifunctional fine-grained access control method suitable for cloud storage
CN109614779A (en) * 2018-12-28 2019-04-12 北京航天数据股份有限公司 A kind of secure data operation method, device, equipment and medium
CN111404665A (en) * 2020-03-10 2020-07-10 南京工业大学 Ciphertext access control method based on CP-ABE
CN114301651B (en) * 2021-12-22 2023-07-21 河南大学 Yellow river dam bank monitoring data sharing method based on CP-ABE

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102916954A (en) * 2012-10-15 2013-02-06 南京邮电大学 Attribute-based encryption cloud computing safety access control method
CN104113408A (en) * 2014-07-11 2014-10-22 西安电子科技大学 Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption
CN104539610A (en) * 2014-12-25 2015-04-22 华中科技大学 Agent re-encryption method for improving outsourced encrypted data sharing function
CN104580205A (en) * 2015-01-05 2015-04-29 南京邮电大学 CP-ABE-based fixed ciphertext length proxy re-encryption system and method in cloud computing
CN104901942A (en) * 2015-03-10 2015-09-09 重庆邮电大学 Distributed access control method for attribute-based encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102916954A (en) * 2012-10-15 2013-02-06 南京邮电大学 Attribute-based encryption cloud computing safety access control method
CN104113408A (en) * 2014-07-11 2014-10-22 西安电子科技大学 Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption
CN104539610A (en) * 2014-12-25 2015-04-22 华中科技大学 Agent re-encryption method for improving outsourced encrypted data sharing function
CN104580205A (en) * 2015-01-05 2015-04-29 南京邮电大学 CP-ABE-based fixed ciphertext length proxy re-encryption system and method in cloud computing
CN104901942A (en) * 2015-03-10 2015-09-09 重庆邮电大学 Distributed access control method for attribute-based encryption

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"云中基于常数级密文属性基加密的访问控制机制";李琦 等;《吉林大学学报(工学版)》;20140515;第44卷(第3期);全文
"云计算环境下基于密文策略的权重属性加密方案";刘西蒙 等;《四川大学学报(工程科学版)》;20131120;第45卷(第6期);全文
"云计算环境中文档安全访问与自毁研究";熊金波;《中国博士学位论文全文库信息科技辑》;20150115;全文
"云计算环境中的组合文档模型及其访问控制方案";熊金波 等;《西安交通大学学报》;20131210;第48卷(第2期);全文

Also Published As

Publication number Publication date
CN106911702A (en) 2017-06-30

Similar Documents

Publication Publication Date Title
CN106911702B (en) Based on the cloud storage block encryption access control method for improving CP-ABE
US11470054B2 (en) Key rotation techniques
CN109614818B (en) Authorized identity-based keyword search encryption method
CN104980477B (en) Data access control method and system under cloud storage environment
CN105656859B (en) Tax control equipment software safety online upgrading method and system
CN109559124A (en) A kind of cloud data safety sharing method based on block chain
CN103533539B (en) Virtual SIM card parameter management method and device
CN111030996B (en) Method and device for accessing resources
EP2830282A1 (en) Storage method, system and device
CN108737374A (en) The method for secret protection that data store in a kind of block chain
CN104158827B (en) Ciphertext data sharing method, device, inquiry server and upload data client
US11316671B2 (en) Accelerated encryption and decryption of files with shared secret and method therefor
CN103391192B (en) A kind of based on secret protection across security domain access control system and control method thereof
CA2949847A1 (en) System and method for secure deposit and recovery of secret data
CN104539420B (en) A kind of safety key managing method of general Intelligent hardware
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
CN105049877A (en) Encryption method and device for live and recorded broadcast interaction system
CN110267270A (en) A kind of substation's inner sensor terminal access Border Gateway authentication intelligence contract
CN103026657A (en) Method and apparatus for providing a key certificate in a tamperproof manner
CN109858255A (en) Data encryption storage method, device and realization device
CN106878322B (en) A kind of encryption and decryption method of fixed length ciphertext and key based on attribute
WO2011022950A1 (en) Service access method, system and device based on wlan access authentication
CN107465681A (en) Cloud computing big data method for secret protection
CN105933345A (en) Verifiable outsourcing attribute-based encryption method based on linear secret sharing
CN113204757A (en) Information interaction method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant