CN111698083A - Attribute-based encryption method capable of outsourcing multiple authorization centers - Google Patents

Attribute-based encryption method capable of outsourcing multiple authorization centers Download PDF

Info

Publication number
CN111698083A
CN111698083A CN202010494444.0A CN202010494444A CN111698083A CN 111698083 A CN111698083 A CN 111698083A CN 202010494444 A CN202010494444 A CN 202010494444A CN 111698083 A CN111698083 A CN 111698083A
Authority
CN
China
Prior art keywords
attribute
user
outsourcing
ciphertext
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010494444.0A
Other languages
Chinese (zh)
Inventor
张馨予
邓桦
翟亚静
秦拯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan University
Original Assignee
Hunan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan University filed Critical Hunan University
Priority to CN202010494444.0A priority Critical patent/CN111698083A/en
Publication of CN111698083A publication Critical patent/CN111698083A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to an attribute-based encryption method capable of outsourcing multiple authorization centers. The invention mainly comprises the following steps: (1) outsourcing calculation and identity verification based on an collusion-free dual-server model; (2) based on multiple rights issuer attribute management without a central rights issuer. The encrypted data are stored in the cloud, the attributes are managed by the multiple authorization centers, and outsourcing calculation and identity verification are completed by the double-server model, so that safe and efficient sharing of the data is realized.

Description

Attribute-based encryption method capable of outsourcing multiple authorization centers
Technical Field
The invention relates to the field of network information security, in particular to an attribute-based encryption method capable of outsourcing multiple authorization centers.
Background
In recent years, with the development of cloud computing, a series of potential safety hazards such as data storage risks, use risks, migration risks, destruction risks, audit risks and the like emerge, and people worry about data safety. The most worrying of these is that cloud service providers reveal user data under the impetus of interest, given the rights of their data center administrators. Therefore, ensuring the storage safety of the data at the cloud server without excessively increasing the calculation load of the user becomes a very urgent and realistic problem.
In order to ensure the confidentiality of the data, a data owner needs to encrypt the data into a ciphertext state in advance and upload the ciphertext state to the cloud server, so that the data can only be accessed by a specified user. In a general encryption method, a data owner encrypts data by using a public key of a designated user, and the designated user decrypts the data by using a private key of the designated user. This encryption method requires the data owner to know who is going to access his data when encrypting. However, in a cloud computing environment, the user size is huge, and the data owner often cannot know in advance who needs to access the data of the data owner. Attribute-Based Encryption (ABE) can solve the problem well. The attribute-based encryption confirms whether decryption is available or not through a matching relation between the access strategy and the attribute set, and a data owner only needs to set the access strategy (or establish the attribute set) to realize a one-to-many secret data sharing mode, so that the problem that a public key is required for encryption when the data owner communicates with a data visitor in advance is avoided. However, there are two problems with current attribute-based encryption.
One is that in most previously proposed ABE systems, the private key of a user is issued by a central authority that is able to verify all the attributes it issues for each user in the system. Such systems are suitable for information sharing based on attributes published by a single trusted organization, however, in many scenarios, access policies are described collectively by attributes published by different trusted organizations, and users wish to share data based on such policies. For example, in a business application, the boeing company and the general electric company collaborate to form a project whose data can only be shared by users having the attribute "engineer" issued by the boeing company or the attribute "manager" issued by the general electric company. For this application, problems may arise with the current ABE system.
Secondly, because the attribute-based encryption scheme applies a large number of bilinear mappings and the computation of bilinear pairings consumes time, as the access structure of the attribute-based encryption scheme becomes more complex, the decryption computation amount of the attribute-based encryption scheme also increases linearly, and finally, the decryption load of the terminal is increased. With the development of wireless communication technology and the popularization of mobile devices, more and more users use mobile terminals to access a cloud platform. Compared with fixed terminals such as desktop computers and servers, the mobile terminal has better portability, but has more limited computing capability and storage resources, and is difficult to bear more complex computation. Therefore, in the face of the increasingly complex access structure of the attribute-based encryption scheme, the extremely increased decryption computation amount is undoubtedly a great challenge for the mobile terminal device.
Disclosure of Invention
The invention provides an outsourced multi-authorization center attribute-based encryption method, which mainly comprises two contents:
(1) outsourcing calculation and identity verification based on an collusion-free dual-server model;
(2) based on multiple rights issuer attribute management without a central rights issuer.
The specific contents are as follows:
the outsourced multi-authority attribute-based encryption method comprises the following ten algorithms:
(1) GlobalSetup (λ) → GP, global initialization algorithm. And inputting a safety parameter lambda and outputting a system global parameter GP. The system selects an order of N ═ p1p2p3The resultant order bilinear group G of (1), where the parameter λ is each prime factor p1,p2,p3The bit length of (c). The global parameter GP is N and
Figure BDA0002522245300000021
one generator g of1Both of them are composed.
(2)AuthoritySetup(aid,GP,{i})→skaid,pkaidThe attribute authority initializes the algorithm. Each attribute authorization center runs the algorithm, inputs the identity authentication aid, the global parameter GP and the attribute set { i } authorized by the authorization center, and outputs the public and private key pair sk of the authorization centeraid,pkaid. The attribute authority sends pkaidPublish, will skaidIn this algorithm, for each attribute i that is affiliated with an authority aid, the authority randomly selects two prime numbers αi,yi∈ZN. For the
Figure BDA0002522245300000031
Will be provided with
Figure BDA0002522245300000032
As a public key, { αi,yiAs a private key. Public key
Figure BDA0002522245300000033
Public, private key { αi,yiPrivate collection.
(3) The data owner inputs plaintext m, an LSSS access structure (A, rho), a global parameter GP, a public key set { pk } corresponding to an attribute authority, outputs two ciphertexts ct1 and ct2 which are respectively sent to cloud servers 1 and 2, wherein A is an LSSS access matrix of n × l, and rho maps each line to a corresponding attribute, and the algorithm generates a random number s ∈ ZNGenerating a random vector
Figure BDA0002522245300000034
The first term of the random vector v is s, generating a random vector
Figure BDA0002522245300000035
The first term of the random vector w is 0. Get AxFor the x-th row of matrix A, for each AxGenerating a random number rx∈ZNDefine λx=Ax·v,ωx=Axω. The ciphertext is generated as follows: calculating C0=me(g1,g1)sGenerating a ciphertext ct2, and calculating
Figure BDA0002522245300000036
Figure BDA0002522245300000037
The ciphertext ct1 is generated. The data owner sends the ciphertext ct1 to the cloud server 1 for storage, and sends the ciphertext ct2 to the cloud server 2 for storage.
(4)PersonalKeyGen(GID,GP,i,sk)→PersonalKeyi,GIDPersonal key generation algorithms. The user sends a request to the authorization center, the attribute authorization center runs the algorithm, the GID of the user, the global parameter GP, the attribute i granted by the authorization center and the corresponding private key sk are input, and the personal key of the user GID for the attribute i is output
Figure BDA0002522245300000038
And sending the data to the user.
(5)KeyGen(GP,i,PersonalKey)→Ki,GIDAnd decrypting the key generation algorithm. The user runs the algorithm and inputs the GID of the user, the global parameter GP, the attribute i granted by a certain authorization center and the personal key PersonalKeyi,GIDOutput decryption key for this attribute
Figure BDA0002522245300000039
(6)proxyKeyGen(ct1,{Ki,GID}, GP) → proxyKey, proxy key generation algorithm. The user runs the algorithm, inputs ct1 for the file to be decrypted, and derives the required set of decryption keys K from the access structurei,GIDGlobal parameter GP, output proxy key proxyKey ═ { due, h (gid), { Ki,GIDAnd } and sending the data to the cloud server 1.
(7) Trans (ct1, proxyKey, GP) → m', verifyproxy, outsourcing decryption algorithm. The cloud server 1 obtains the semi-decrypted ciphertext m' and the verification proxy key verifyproxy according to the proxy key proxyKey. Further, a cloud server
1, the tuuse is also scrambled to generate the tuuse ', so as to generate an authentication proxy key verifyproxy ═ tuuse', { K) used by the cloud server 2 to authenticate the identity of the useri,GID}}. The calculation of the semi-decrypted ciphertext m' takes advantage of the simple nature of bilinear mapping
Figure BDA0002522245300000041
The process is as follows:
Figure BDA0002522245300000042
take a constant such that ∑xcxAxIf (1, 0.., 0), then
Figure BDA0002522245300000043
(8) Randomselect (verifyproxy) → select, random selection algorithm. The cloud server 2 randomly selects a decryption key select K for a certain attribute from the authentication proxy key verifyproxy sent by the useri,GIDAnd sending the data to the user.
(9) Verify (personal key, GP, select) → true/false, Verify algorithm. The cloud server 2 returns a corresponding a contained in the PersonalKey returned by the useriAnd
Figure BDA0002522245300000044
generating decryption keys
Figure BDA0002522245300000045
If K'i,GID=Ki,GIDThen the verification is successful and the cloud server 2 sends ct2 to the user, otherwise it fails.
(10) Decrypt (m', ct2, GP) → m, local decryption algorithm. The user decrypts the encrypted text according to the returned m' and ct2 to obtain the plaintext
Figure BDA0002522245300000046
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The invention relates to an outsourced multi-authorization center attribute-based encryption method, which comprises the following specific steps:
the outsourced multi-authorization-center attribute-based encryption method comprises five entities, namely an attribute authorization center(s), a data owner, a user, a cloud server 1 and a cloud server 2.
The method comprises the following steps: system initialization
The system is initialized, a global initialization algorithm is operated, and each user is allocated with a unique identity GID. Each authorization center runs an attribute authorization center initialization algorithm, and grants the corresponding attributes of the user according to the user identification GID, and the specific operation is that the authorization center generates a public and private key pair aiming at a certain attribute, a public key is disclosed, a private key is private, and a personal key generation algorithm is run according to the user GID to generate a personal key which is sent to the user. And the user runs a decryption key generation algorithm according to the personal key to generate and store a decryption key aiming at the attribute.
Step two: encrypting data
When the data owner wants to share the sensitive data, the data owner executes an encryption algorithm to upload the generated two parts of ciphertexts (the ciphertexts 1 and 2) to the cloud server 1 and the cloud server 2 respectively for storage.
Step three: outsourcing decryption and identity verification
When a user wants to acquire sensitive data, the user first sends an access request to the cloud server 1, runs a proxy key generation algorithm according to an access structure returned by the cloud server 1 to generate a proxy key, and sends the proxy key to the cloud server 1. Then, the cloud server 1 runs the outsource decryption algorithm to return the semi-decrypted ciphertext and the verification proxy key. Subsequently, the user forwards the authentication proxy key to the cloud server 2, the cloud server 2 runs a random selection algorithm to select one decryption key as K to be sent to the user, and the user returns the personal key for generating the decryption key. The cloud server 2 generates a decryption key K 'by using the received personal key, runs a verification algorithm, and if K is equal to K', it is indicated that the user identity is legal, and the cloud server 2 sends a ciphertext 2 to the user.
Step four: local decryption
And the user operates the local decryption algorithm to operate the semi-decrypted ciphertext and the ciphertext 2 to obtain the plaintext.

Claims (3)

1. An attribute-based encryption method capable of outsourcing multiple authorization centers is characterized by comprising the following steps:
1) outsourcing calculation and identity verification based on an collusion-free dual-server model;
2) based on multiple rights issuer attribute management without a central rights issuer.
2. The collusion-free dual-server model-based outsourcing computation and authentication of claim 1, wherein: the data owner encrypts locally, and the ciphertext is divided into two parts to be uploaded to two semi-honest unfconcubing cloud servers respectively. The cloud server 1 is responsible for ciphertext storage and outsourcing computation, and the cloud server 2 is responsible for ciphertext storage and identity verification. After the user sends the access request, the two cloud servers respectively carry out calculation and verification and then send the ciphertext to the user, and the user can obtain the plaintext only by carrying out simple operation on the two servers.
3. The centerless, multiple authority attribute management based on claim 1 wherein: either party may become the rights issuer by creating a public-private key pair that reflects the user's attributes. The method has no central authorization center, thereby avoiding performance bottleneck and potential safety hazard caused by over depending on one central authorization center.
CN202010494444.0A 2020-06-03 2020-06-03 Attribute-based encryption method capable of outsourcing multiple authorization centers Pending CN111698083A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010494444.0A CN111698083A (en) 2020-06-03 2020-06-03 Attribute-based encryption method capable of outsourcing multiple authorization centers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010494444.0A CN111698083A (en) 2020-06-03 2020-06-03 Attribute-based encryption method capable of outsourcing multiple authorization centers

Publications (1)

Publication Number Publication Date
CN111698083A true CN111698083A (en) 2020-09-22

Family

ID=72479295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010494444.0A Pending CN111698083A (en) 2020-06-03 2020-06-03 Attribute-based encryption method capable of outsourcing multiple authorization centers

Country Status (1)

Country Link
CN (1) CN111698083A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104038341A (en) * 2014-06-20 2014-09-10 北京航空航天大学 Identity-based cross-system proxy re-encryption method
CN108390876A (en) * 2018-02-13 2018-08-10 西安电子科技大学 Revocation outsourcing is supported to can verify that more authorization center access control methods, Cloud Server
CN109768858A (en) * 2018-12-26 2019-05-17 西安电子科技大学 Based on the encryption attribute access control system more authorized and design method under cloud environment
CN110933033A (en) * 2019-10-27 2020-03-27 西安电子科技大学 Cross-domain access control method for multiple Internet of things domains in smart city environment
CN111079191A (en) * 2020-01-09 2020-04-28 内蒙古大学 CP-ABE access control scheme based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104038341A (en) * 2014-06-20 2014-09-10 北京航空航天大学 Identity-based cross-system proxy re-encryption method
CN108390876A (en) * 2018-02-13 2018-08-10 西安电子科技大学 Revocation outsourcing is supported to can verify that more authorization center access control methods, Cloud Server
CN109768858A (en) * 2018-12-26 2019-05-17 西安电子科技大学 Based on the encryption attribute access control system more authorized and design method under cloud environment
CN110933033A (en) * 2019-10-27 2020-03-27 西安电子科技大学 Cross-domain access control method for multiple Internet of things domains in smart city environment
CN111079191A (en) * 2020-01-09 2020-04-28 内蒙古大学 CP-ABE access control scheme based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
鲁黎明: ""基于CP-ABE的云访问控制技术研究"", 《中国优秀硕士学位论文全文数据库》 *

Similar Documents

Publication Publication Date Title
CN106961336B (en) A kind of key components trustship method and system based on SM2 algorithm
AU2003202511B2 (en) Methods for authenticating potential members invited to join a group
JP4866863B2 (en) Security code generation method and user device
CN101720071B (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN108352015A (en) The anti-loss storage of Secure for the system combination wallet management system based on block chain and encryption key transfer
CN106487506B (en) Multi-mechanism KP-ABE method supporting pre-encryption and outsourcing decryption
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
CN110572258B (en) Cloud password computing platform and computing service method
CN103259651A (en) Encryption and decryption method and system of terminal data
CN102546600A (en) Deputy-based encryption, decryption method, network equipment, network device and system
CN113708917B (en) APP user data access control system and method based on attribute encryption
Yadav et al. Mobile cloud computing issues and solution framework
Agarkhed et al. An efficient auditing scheme for data storage security in cloud
CN102999710A (en) Method, equipment and system for safely sharing digital content
Agarkhed et al. Security and privacy for data storage service scheme in cloud computing
Chang et al. Multi-user searchable encryption scheme with constant-size keys
Wala Aldeen Khairi Framework For Modeling and Simulation of Secure Cloud Services
CN111698083A (en) Attribute-based encryption method capable of outsourcing multiple authorization centers
Kumari A Review: Different Challenges in Energy-Efficient Cloud Security
Sawle et al. Survey on data classification and data encryption techniques used in cloud computing
Wu et al. A privacy protection scheme for facial recognition and resolution based on edge computing
Swetha et al. A Secured Cloud Environment with User Validation Method for Data Communication
Ramane et al. A metadata verification scheme for data auditing in cloud environment
Gupta et al. Data Security in Distributed Environments
Zkik et al. New homomorphic platform for authentication and downloading data in MCC

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200922