CN107484161B - A kind of efficient information push based on mobile self-grouping network and safe sharing method - Google Patents

A kind of efficient information push based on mobile self-grouping network and safe sharing method Download PDF

Info

Publication number
CN107484161B
CN107484161B CN201710606319.2A CN201710606319A CN107484161B CN 107484161 B CN107484161 B CN 107484161B CN 201710606319 A CN201710606319 A CN 201710606319A CN 107484161 B CN107484161 B CN 107484161B
Authority
CN
China
Prior art keywords
information
user
key
snapshot
publisher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710606319.2A
Other languages
Chinese (zh)
Other versions
CN107484161A (en
Inventor
樊强
彭启伟
罗旺
冯敏
夏源
崔漾
赵高峰
张天兵
余磊
屠正伟
马涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
East China Normal University
State Grid Shandong Electric Power Co Ltd
Nanjing NARI Group Corp
Original Assignee
State Grid Corp of China SGCC
East China Normal University
State Grid Shandong Electric Power Co Ltd
NARI Group Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, East China Normal University, State Grid Shandong Electric Power Co Ltd, NARI Group Corp filed Critical State Grid Corp of China SGCC
Priority to CN201710606319.2A priority Critical patent/CN107484161B/en
Publication of CN107484161A publication Critical patent/CN107484161A/en
Application granted granted Critical
Publication of CN107484161B publication Critical patent/CN107484161B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of efficient information push and safe share system and method based on mobile self-grouping network, solve the problems, such as that information sharing lacks safety, actual effect and access control in existing mobile self-grouping network.System includes insincere third party Internet Service Provider, key generation centre, agent side, information publisher, shares user.Key generation centre generates the decrypted private key and public key of user, is sent to agent side by network, information publisher, shares user;Agent side pushes messages to the user of access authority;Information publisher formulates access control policy, is compressed to information, generates snapshot and encryption;Share user snapshot, information are decrypted and are decompressed, obtains prime information.The present invention is based on attribute encryption technologies, can the shared information in mobile self-grouping network be compressed, encrypt and efficiently be pushed, and guarantee the high efficiency that information is shared in mobile social networking, safety, confidentiality, realize effective access control.

Description

A kind of efficient information push based on mobile self-grouping network and safe sharing method
Technical field
The present invention relates to a kind of field of information security technology, are based on attribute encryption technology, fine granularity more particularly, to one kind In the mobile self-grouping network of access control the efficient cryptographic of information with share.
Background technique
Nowadays, mobile ad hoc networks have become the important component that we produce, live, Internet of Things, mobile Internet Network etc. revolutionizes the information interchange mode between object.These mobile self-grouping networks provide various between node Interaction mechanism, thus generated security risk also has been to be concerned by more and more people.One of major issue is how The privacy for protecting nodal information publication, guarantees the access control of information, prevents information leakage, even if the service provider of network It cannot obtain its content.
In the prior art, Randy Baden et al. was published in " ACM SIGCOMM Computer in 2009 Communication Review " paper " Persona:an online social network with user- Defined privacy " in support public-key encryption and the encryption based on attribute;Amin Tootoonchian et al. exists It is published within 2009 " Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies " paper " Lockr:better privacy for Social networks " in, content is separated with function, this allows user to determine wherein to store their letter Breath.These schemes focus on the fine access control of data, but do not account under mobile network how at the same guarantee the efficient of message Push.
Summary of the invention
The present invention mainly solves mobile self-grouping network in the prior art, and the data sharing between user lacks safety Property, without effectively realize access control the problem of, provide a kind of shifting based on attribute encryption technology and fine-granularity access control The encryption and sharing method of data in dynamic ad-hoc network.
Above-mentioned technical problem of the invention is mainly to be addressed by following technical proposals:
A kind of efficient information push based on mobile self-grouping network and safe share system, it is characterised in that: including as follows Five parts: insincere third party Internet Service Provider, agent side, information publisher, shares user at key generation centre;
Wherein,
Key generation centre: the mechanism for generating public key and private key;
Agent side: quickly judge to share whether user possesses access authority, and push messages to access authority Share user;
Information publisher: formulating access control policy according to demand, is compressed to information, generates snapshot and encryption, and Ciphertext is uploaded to insincere third party Internet Service Provider;
Share user: snapshot, information being decrypted and decompressed, information original text is obtained.
A kind of efficient information push based on mobile self-grouping network and safe sharing method, using above system, feature Be the following steps are included:
S1. system is initialized, and generates public key PK and master key MK;
S2. key generation centre generates the decrypted private key SK and transition key TK of the user according to the attribute of user;
S3. information publisher handles shared picture, video, audio-frequency information m using the lossless compression of self-adapting dictionary, Compressed information PS is obtained, and saves a snapshot Snapshot, information publisher is using AES symmetric encipherment algorithm to compression Information PS afterwards is encrypted, and the access structure of set information, and AES key and snapshot Snapshot are carried out with access structure Encryption, is uploaded to insincere third party Internet Service Provider;
S4. never trusted third party Internet Service Provider downloads ciphertext to agent side, judges the access authority for sharing user Snapshot Snapshot is pushed to if meeting and is shared user by the access control policy for whether meeting ciphertext;
S5. when sharing user click snapshot Snapshot, then information is decrypted, is decompressed, obtain prime information.
A kind of efficient information push based on mobile self-grouping network above-mentioned and safe sharing method, characterized in that step Initialization procedure includes: in S1
S11. key generation centre operation bilinearity parameter generators generate the Bilinear Groups G that two ranks are prime number p1And GT, Wherein e:G1×G1→GTFor Bilinear Pairing operation;
S12. from group G1Middle random selection | U | a element obtains generating first h1,…,hU
S13. random number α is selected12,α∈Zp, so that α=(α12) mod p, ZpFor p-1 factorial method prime number group;
S14. system public key PK and master key MK are obtained,
PK=(g, e (g, g)α,gα,h1,…,hU), MK=gα
Wherein, e (g, g)αIndicate the alpha index operation of Bilinear Pairing, g groups are G1Generation member, gαRefer to generate the α of member g Number operation.
A kind of efficient information push based on mobile self-grouping network above-mentioned and safe sharing method, characterized in that step The process of generation private key for user SK and transition key TK includes: in S2
S21. in user's registration, key generation centre is that the user distributes globally unique ID;
S22. key generation centre selects random number t according to master key MK, the attribute set S of user and the ID of user ∈Zp, generate the private key of user:
S23. key generation centre generates the conversion private key TK of user:Transition key is transmitted to agent side.
A kind of efficient information push based on mobile self-grouping network above-mentioned and safe sharing method, information publisher's publication Message m compresses message, compressed information PS, snapshot Snapshot is encrypted, and be uploaded to insincere third The process of square Internet Service Provider includes:
S31. AES key SecKey is randomly generated in information publisher;
S32. information publisher encrypts compressed information PS using AES key SecKey, obtains information ciphertext CT1, while generating snapshot Snapshot;
S33. information publisher defines the access control policy (M, ρ) of message, and wherein M is the linear privacy sharing of l row n column Matrix, for all i=1, every a line of 2 ... l, the i-th row of matrix M is identified as the function of ρ (i), ρ be one from 1 ..., and l } it is mapped to the function of participant set;
S34. random vector is selectedFor every a line of matrix M, from i=1 to i =l is calculatedWherein MiThe i-th row vector of homography M, sm are the shared information of information publisher, y2,…, ynFor ZpThe random number of middle selection,For ZpN random number of middle selection;
S35. information publisher selects random number r according to public key PK, access control policy (M, ρ)1…rl∈Zp, to AES Key SecKey and snapshot Snapshop encrypt to obtain ciphertext CT, with m ' indicate AES key SecKey and snapshot Snapshop,
S36. CT1, CT are uploaded to insincere third party Internet Service Provider by information publisher together.
A kind of efficient information push based on mobile self-grouping network above-mentioned and safe sharing method, it is characterized in that agent side The access authority of user is shared in judgement, and the process for carrying out message push includes:
S41. never trusted third party's ad-hoc network service provider gets the ciphertext CT of user, agent side root to agent side According to the transition key of user, CT is judged to share whether user has permission to access the information by solving following equation,
i∈IMiwi=(1,0 ..., 0)
Wherein, MiThe i-th row vector of representing matrix M, { wi∈Zp}i∈lFor constant.If there is one group of solution { wi∈Zp}i∈l, It then indicates that sharing user has permission to access, then pushes messages to and share user.
A kind of efficient information push based on mobile self-grouping network above-mentioned and safe sharing method, it is characterized in that step S5 Middle sharing user includes: to the process that information is decrypted
S51. share user never trusted third party Internet Service Provider place downloading ciphertext CT1, CT;
S52. share the private key SK that user utilizes oneself, ciphertext CT calculated as follows,
Wherein, L is the t exponent arithmetic for generating member g, Kρ(i)Generation member h corresponding to attribute for function ρ (i) mappingρ(i) T exponent arithmetic.
To e (g, g)αsFurther calculating can be obtained m ': m '=C/e (g, g)αs, including AES key SecKey and fast According to Snapshot;
S53. share user information CT1 is decrypted using AES key SecKey, obtain compressed message PS;
S54. share user to unzip it compressed message using self-adapting dictionary compress mode, obtain former letter Breath.
Therefore, the present invention devises the method for being suitable for the sharing of mobile self-grouping network information, and the program can be point It enjoys information and carries out efficiently push and the safe flexible access control shared, carried out for user to its sharing information.Present invention tool It is easily achieved, the advantages that privacy of user protectiveness is strong, and permission flexibly controls information.
Detailed description of the invention
Attached drawing 1 is a kind of structural frames diagram of the invention.
Specific embodiment
A kind of efficient information push based on mobile self-grouping network and safe share system, it is characterised in that: including as follows Five parts: insincere third party Internet Service Provider, agent side, information publisher, shares user at key generation centre;
Wherein,
Key generation centre: the mechanism for generating public key and private key;
Agent side: quickly judge to share whether user possesses access authority, and push messages to access authority Share user;
Information publisher: formulating access control policy according to demand, is compressed to information, generates snapshot and encryption, and Ciphertext is uploaded to insincere third party Internet Service Provider;
Share user: snapshot, information being decrypted and decompressed, information original text is obtained.
A kind of efficient information push based on mobile self-grouping network and safe sharing method, using above system, feature Be the following steps are included:
S1. system is initialized, and generates public key PK and master key MK;
S2. key generation centre generates the decrypted private key SK and transition key TK of the user according to the attribute of user;
S3. information publisher handles shared picture, video, audio-frequency information m using the lossless compression of self-adapting dictionary, Compressed information PS is obtained, and saves a snapshot Snapshot, information publisher is using AES symmetric encipherment algorithm to compression Information PS afterwards is encrypted, and the access structure of set information, and AES key and snapshot Snapshot are carried out with access structure Encryption, is uploaded to insincere third party Internet Service Provider;
S4. never trusted third party Internet Service Provider downloads ciphertext to agent side, judges the access authority for sharing user Snapshot Snapshot is pushed to if meeting and is shared user by the access control policy for whether meeting ciphertext;
S5. when sharing user click snapshot Snapshot, then information is decrypted, is decompressed, obtain prime information.
In step S1, initialization procedure includes:
S11. key generation centre operation bilinearity parameter generators generate the Bilinear Groups G that two ranks are prime number p1And GT, Wherein e:G1×G1→GTFor Bilinear Pairing operation;
S12. from group G1Middle random selection | U | a element obtains generating first h1,…,hU
S13. random number α is selected12,α∈Zp, so that α=(α12) mod p, ZpFor p-1 factorial method prime number group;
S14. system public key PK and master key MK are obtained,
PK=(g, e (g, g)α,gα,h1,…,hU), MK=gα
Wherein e (g, g)αIndicate the alpha index operation of Bilinear Pairing, g groups are G1Generation member, gαRefer to generate the α of member g Number operation.
In step S2, the process for generating private key for user SK and transition key TK includes:
S21. in user's registration, key generation centre is that the user distributes globally unique ID;
S22. key generation centre selects random number t according to master key MK, the attribute set S of user and the ID of user ∈Zp, generate the private key of user:
S23. key generation centre generates the conversion private key TK of user:Transition key is transmitted to agent side;It is false If three users A, B, C, ID A, B, C, private key and transition key are respectively SKA、TKA, SKB、TKB, SKC、TKC
A kind of efficient information push based on mobile self-grouping network above-mentioned and safe sharing method, information publisher A hair Cloth message m, compresses message, and compressed information PS, snapshot Snapshot are encrypted, and is uploaded to insincere The process of triple net service provider includes:
S31. AES key SecKey is randomly generated in information publisher;
S32. information publisher encrypts compressed information PS using AES key SecKey, obtains information ciphertext CT1, while generating snapshot Snapshot;
S33. information publisher A defines the access control policy (M, ρ) of message, and the attribute including B, wherein M is l row n column Linear privacy sharing matrix, for all i=1, every a line of 2 ... l, the i-th row of matrix M is identified as the function of ρ (i), ρ be one from 1 ..., l+ is mapped to the function of participant set;
S34. random vector is selectedFor every a line of matrix M, from i=1 to i =l is calculatedWherein MiThe i-th row vector of homography M, sm are the shared information of information publisher, y2,…, ynFor ZpThe random number of middle selection,For ZpN random number of middle selection;
S35. information publisher A selects random number r according to public key PK, access control policy (M, ρ)1…rl∈Zp, to AES Key SecKey and snapshot Snapshop encrypt to obtain ciphertext CT, with m ' indicate AES key SecKey and snapshot Snapshop,
S36. CT1, CT are uploaded to insincere third party Internet Service Provider by information publisher together.
The access authority of user is shared in agent side judgement, and the process for carrying out message push includes:
S41. never trusted third party Internet Service Provider gets the ciphertext CT of user to agent side, agent side according to The transition key at family judges whether sharing user has permission to access the information by solving following equation to CT,
i∈IMiwi=(1,0 ..., 0)
Wherein, MiThe i-th row vector of representing matrix M, { wi∈Zp+i∈lFor constant.If there is one group of solution { wi∈Zp+i∈l, It then indicates that sharing user has permission to access, then pushes messages to and share user, the transition key of agent side B judges B pairs The ciphertext CT that A shares has access authority, and message is pushed to B, and C does not have access authority.
Share user in step S5 includes: to the process that information is decrypted
S51. share user B never trusted third party Internet Service Provider place downloading ciphertext CT1, CT;
S52. share the private key SK that user B utilizes oneself, ciphertext CT calculated as follows,
Wherein, L is the t exponent arithmetic for generating member g, Kρ(i)Generation member h corresponding to attribute for function ρ (i) mappingρ(i) T exponent arithmetic.
To e (g, g)αsFurther calculating can be obtained m ': m '=C/e (g, g)αs, including AES key SecKey and fast According to Snapshot;
S53. share user B information CT1 is decrypted using AES key SecKey, obtain compressed message PS;
S54. share user B to unzip it compressed message using self-adapting dictionary compress mode, obtain former letter Breath.

Claims (5)

1. a kind of efficient information push based on mobile self-grouping network and safe sharing method, characterized in that the following steps are included:
S1. system is initialized, and generates public key PK and master key MK;
S2. key generation centre generates the decrypted private key SK and transition key TK of the user according to the attribute of user;
S3. information publisher handles shared picture, video, audio-frequency information m using the lossless compression of self-adapting dictionary, obtains Compressed information PS, and a snapshot Snapshot is saved, information publisher is using AES symmetric encipherment algorithm to compressed Information PS is encrypted, and the access structure of set information, and AES key and snapshot Snapshot are added with access structure It is close, it is uploaded to insincere third party Internet Service Provider;
S4. agent side never trusted third party Internet Service Provider download ciphertext, judge share user access authority whether Snapshot Snapshot is pushed to if meeting and is shared user by the access control policy for meeting ciphertext;
S5. when sharing user click snapshot Snapshot, then information is decrypted, is decompressed, obtain prime information;
In step s3, information publisher gives out information m, compresses to message, by compressed information PS, snapshot Snapshot is encrypted, and the process for being uploaded to insincere third party Internet Service Provider includes:
S31. AES key SecKey is randomly generated in information publisher;
S32. information publisher encrypts compressed information PS using AES key SecKey, obtains information ciphertext CT1, Snapshot Snapshot is generated simultaneously;
S33. information publisher defines the access control policy (M, ρ) of message, and wherein M is the linear privacy sharing square of l row n column Battle array, for all i=1,2 ... every a line of l, the i-th row of matrix M are identified as the function of ρ (i), ρ be one from { 1 ..., l } is mapped to the function of participant set;
S34. random vector is selectedFor every a line of matrix M, from i=1 to i=l, meter It calculatesWherein MiThe i-th row vector of homography M, sm are the shared information of information publisher, y2..., ynFor Zp The random number of middle selection,For ZpN random number of middle selection;
S35. information publisher selects random number r according to public key PK, access control policy (M, ρ)1...rl∈Zp, to the close of AES Key SecKey and snapshot Snapshop encrypts to obtain ciphertext CT, and the key SecKey and snapshot Snapshop of AES are indicated with m ',
S36. CT1, CT are uploaded to insincere third party Internet Service Provider by information publisher together.
2. a kind of efficient information push based on mobile self-grouping network according to claim 1 and safe sharing method, It is characterized in, in step S1, initialization procedure includes:
S11. key generation centre operation bilinearity parameter generators generate the Bilinear Groups G that two ranks are prime number p1And GT, wherein E:G1×G1→GTFor Bilinear Pairing operation;
S12. from group G1Middle random selection | U | a element obtains generating first h1..., hU
S13. random number α is selected1, α2, α ∈ Zp, so that α=(α12) mod p, ZpFor p-1 factorial method prime number group;
S14. system public key PK and master key MK are obtained,
PK=(g, e (g, g)α, gα, h1..., hU), MK=gα
Wherein e (g, g)αIndicate the alpha index operation of Bilinear Pairing, g groups are G1Generation member, gαFor the alpha index fortune for generating member g It calculates.
3. a kind of efficient information push based on mobile self-grouping network according to claim 1 and safe sharing method, It is characterized in, the process that private key for user SK and transition key TK is generated in step S2 includes:
S21. in user's registration, key generation centre is that the user distributes globally unique ID;
S22. key generation centre selects random number t ∈ Z according to master key MK, the attribute set S of user and the ID of userp, Generate the private key of user:
S23. key generation centre generates the conversion private key TK of user:Transition key is transmitted to agent side.
4. a kind of efficient information push based on mobile self-grouping network according to claim 1 and safe sharing method, It is characterized in that the access authority of user is shared in agent side judgement, the process for carrying out message push includes:
S41. never trusted third party Internet Service Provider gets the ciphertext CT of user to agent side, and agent side is according to user's Transition key judges whether sharing user has permission to access the information by solving following equation to CT,
i∈IMiwi=(1,0 ..., 0)
Wherein, MiThe i-th row vector of representing matrix M, { wi∈Zp}i∈lFor constant, if there is one group of solution { wi∈Zp}i∈l, then table Show that sharing user has permission to access, then pushes messages to and share user.
5. a kind of efficient information push based on mobile self-grouping network according to claim 1 and safe sharing method, It is characterized in that share user in step S7 includes: to the process that information is decrypted
S51. share user never trusted third party Internet Service Provider place downloading ciphertext CT1, CT;
S52. share the private key SK that user utilizes oneself, ciphertext CT calculated as follows,
Wherein, L is the t exponent arithmetic for generating member g, Kρ(i)Generation member h corresponding to attribute for function ρ (i) mappingρ(i)T refer to Number operation;
To e (g, g)αsFurther calculating can be obtained m ': m '=C/e (g, g)αs, including AES key SecKey and snapshot Snapshot;
S53. share user information CT1 is decrypted using AES key SecKey, obtain compressed message PS;
S54. share user to unzip it compressed message using self-adapting dictionary compress mode, obtain prime information.
CN201710606319.2A 2017-07-24 2017-07-24 A kind of efficient information push based on mobile self-grouping network and safe sharing method Active CN107484161B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710606319.2A CN107484161B (en) 2017-07-24 2017-07-24 A kind of efficient information push based on mobile self-grouping network and safe sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710606319.2A CN107484161B (en) 2017-07-24 2017-07-24 A kind of efficient information push based on mobile self-grouping network and safe sharing method

Publications (2)

Publication Number Publication Date
CN107484161A CN107484161A (en) 2017-12-15
CN107484161B true CN107484161B (en) 2019-05-24

Family

ID=60595930

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710606319.2A Active CN107484161B (en) 2017-07-24 2017-07-24 A kind of efficient information push based on mobile self-grouping network and safe sharing method

Country Status (1)

Country Link
CN (1) CN107484161B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108712379B (en) * 2018-04-08 2021-05-25 北京奇艺世纪科技有限公司 Data pushing method and device
US11799634B2 (en) 2020-09-30 2023-10-24 Qatar Foundation For Education, Science And Community Development Mesh network for resource-constrained devices
CN113225245A (en) * 2021-04-30 2021-08-06 深圳沐奇科技有限公司 Information interaction method for social media platform

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132273A (en) * 2006-08-24 2008-02-27 北京大唐高鸿软件技术有限公司 Safe transmission method for text transport protocol message
CN103281400A (en) * 2013-06-18 2013-09-04 清华大学 Data segmenting, coding and recovering method used for cloud storage gateway
CN104022868A (en) * 2014-02-18 2014-09-03 杭州师范大学 Outsourcing decryption method of attribute-based encryption based on ciphertext policy
CN104461785A (en) * 2014-12-15 2015-03-25 中电长城网际系统应用有限公司 Data backup method, data recovery method and device of virtual machine and physic machine
CN105897709A (en) * 2016-04-01 2016-08-24 西安电子科技大学 User attribute encryption and decryption method of non-monotonic access structure in distributed network
CN106341236A (en) * 2016-09-09 2017-01-18 深圳大学 Access control method facing cloud storage service platform and system thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8769259B2 (en) * 2012-01-06 2014-07-01 Alcatel Lucent Methods and apparatuses for secure information sharing in social networks using randomly-generated keys

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132273A (en) * 2006-08-24 2008-02-27 北京大唐高鸿软件技术有限公司 Safe transmission method for text transport protocol message
CN103281400A (en) * 2013-06-18 2013-09-04 清华大学 Data segmenting, coding and recovering method used for cloud storage gateway
CN104022868A (en) * 2014-02-18 2014-09-03 杭州师范大学 Outsourcing decryption method of attribute-based encryption based on ciphertext policy
CN104461785A (en) * 2014-12-15 2015-03-25 中电长城网际系统应用有限公司 Data backup method, data recovery method and device of virtual machine and physic machine
CN105897709A (en) * 2016-04-01 2016-08-24 西安电子科技大学 User attribute encryption and decryption method of non-monotonic access structure in distributed network
CN106341236A (en) * 2016-09-09 2017-01-18 深圳大学 Access control method facing cloud storage service platform and system thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
支持属性撤销和解密外包的属性基加密方案;马华等;《西安电子科技大学学报》;20151231;第6-10页

Also Published As

Publication number Publication date
CN107484161A (en) 2017-12-15

Similar Documents

Publication Publication Date Title
Xu et al. Secure fine-grained access control and data sharing for dynamic groups in the cloud
CN101807991B (en) Ciphertext policy attribute-based encryption system and method
US11128454B2 (en) Quantum safe cryptography and advanced encryption and key exchange (AEKE) method for symmetric key encryption/exchange
CN111431897B (en) Multi-attribute mechanism attribute-based encryption method with tracking function for cloud-assisted Internet of things
Abusukhon et al. New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value
CN107484161B (en) A kind of efficient information push based on mobile self-grouping network and safe sharing method
CN108462575A (en) Upload data ciphering method based on no trusted party thresholding Hybrid Encryption
CN108400862A (en) A kind of intelligent power trusted end-user data fusion encryption method
US20230208615A1 (en) Online-Streamer Image Model File Transmission in Co-Hosting During Livestreaming
Kaur et al. A random selective block encryption technique for secure image cryptography using blowfish algorithm
CN113411323A (en) Medical record data access control system and method based on attribute encryption
US11411720B2 (en) Key distribution system, terminal device, key distribution method, and program
Zhang et al. An efficient image encryption scheme for industrial Internet-of-Things devices
CN114095171A (en) Identity-based wearable proxy re-encryption method
Zhang et al. Data owner based attribute based encryption
CN112787822A (en) SM 9-based attribute encryption method and system under large attribute set
Somaiya et al. Implementation and evaluation of EMAES–A hybrid encryption algorithm for sharing multimedia files with more security and speed
Rachmawati et al. A combination of vigenere algorithm and one time pad algorithm in the three-pass protocol
CN108768923A (en) A kind of real-time encrypted method of chat of the Encryption Algorithm based on Quantum Reversible Logic circuit
CN110321722B (en) DNA sequence similarity safe calculation method and system
Guo et al. A novel (n, t, n) secret image sharing scheme without a trusted third party
Shivaputra et al. A Naïve Visual Cryptographic Algorithm for the Transfer of Compressed Medical Images
Nagaraju et al. Key-cipher policy attribute-based encryption mechanism for access control of multimedia data in cloud storages
HUANG et al. Encrypted data sharing with multi-owner based on digital rights management in online social networks
CN114422107B (en) Fault-tolerant ciphertext data aggregation method based on intelligent engineering construction system platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right

Effective date of registration: 20180704

Address after: 100031 West Chang'an Avenue, Xicheng District, Xicheng District, Beijing

Applicant after: State Grid Corporation of China

Applicant after: Nanjing Nari Co., Ltd.

Applicant after: East China Normal University

Applicant after: State Grid Shandong Electric Power Company

Address before: 100761 West Chang'an Avenue, Xicheng District, Xicheng District, Beijing

Applicant before: State Grid Corporation of China

Applicant before: Nanjing Nari Co., Ltd.

Applicant before: East China Normal University

TA01 Transfer of patent application right
CB02 Change of applicant information

Address after: 100031 West Chang'an Avenue, Xicheng District, Xicheng District, Beijing

Applicant after: State Grid Corporation of China

Applicant after: NARI Group Co. Ltd.

Applicant after: East China Normal University

Applicant after: State Grid Shandong Electric Power Company

Address before: 100031 West Chang'an Avenue, Xicheng District, Xicheng District, Beijing

Applicant before: State Grid Corporation of China

Applicant before: Nanjing Nari Co., Ltd.

Applicant before: East China Normal University

Applicant before: State Grid Shandong Electric Power Company

CB02 Change of applicant information
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant