CN111698083A - Attribute-based encryption method capable of outsourcing multiple authorization centers - Google Patents
Attribute-based encryption method capable of outsourcing multiple authorization centers Download PDFInfo
- Publication number
- CN111698083A CN111698083A CN202010494444.0A CN202010494444A CN111698083A CN 111698083 A CN111698083 A CN 111698083A CN 202010494444 A CN202010494444 A CN 202010494444A CN 111698083 A CN111698083 A CN 111698083A
- Authority
- CN
- China
- Prior art keywords
- attribute
- user
- outsourcing
- ciphertext
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to an attribute-based encryption method capable of outsourcing multiple authorization centers. The invention mainly comprises the following steps: (1) outsourcing calculation and identity verification based on an collusion-free dual-server model; (2) based on multiple rights issuer attribute management without a central rights issuer. The encrypted data are stored in the cloud, the attributes are managed by the multiple authorization centers, and outsourcing calculation and identity verification are completed by the double-server model, so that safe and efficient sharing of the data is realized.
Description
Technical Field
The invention relates to the field of network information security, in particular to an attribute-based encryption method capable of outsourcing multiple authorization centers.
Background
In recent years, with the development of cloud computing, a series of potential safety hazards such as data storage risks, use risks, migration risks, destruction risks, audit risks and the like emerge, and people worry about data safety. The most worrying of these is that cloud service providers reveal user data under the impetus of interest, given the rights of their data center administrators. Therefore, ensuring the storage safety of the data at the cloud server without excessively increasing the calculation load of the user becomes a very urgent and realistic problem.
In order to ensure the confidentiality of the data, a data owner needs to encrypt the data into a ciphertext state in advance and upload the ciphertext state to the cloud server, so that the data can only be accessed by a specified user. In a general encryption method, a data owner encrypts data by using a public key of a designated user, and the designated user decrypts the data by using a private key of the designated user. This encryption method requires the data owner to know who is going to access his data when encrypting. However, in a cloud computing environment, the user size is huge, and the data owner often cannot know in advance who needs to access the data of the data owner. Attribute-Based Encryption (ABE) can solve the problem well. The attribute-based encryption confirms whether decryption is available or not through a matching relation between the access strategy and the attribute set, and a data owner only needs to set the access strategy (or establish the attribute set) to realize a one-to-many secret data sharing mode, so that the problem that a public key is required for encryption when the data owner communicates with a data visitor in advance is avoided. However, there are two problems with current attribute-based encryption.
One is that in most previously proposed ABE systems, the private key of a user is issued by a central authority that is able to verify all the attributes it issues for each user in the system. Such systems are suitable for information sharing based on attributes published by a single trusted organization, however, in many scenarios, access policies are described collectively by attributes published by different trusted organizations, and users wish to share data based on such policies. For example, in a business application, the boeing company and the general electric company collaborate to form a project whose data can only be shared by users having the attribute "engineer" issued by the boeing company or the attribute "manager" issued by the general electric company. For this application, problems may arise with the current ABE system.
Secondly, because the attribute-based encryption scheme applies a large number of bilinear mappings and the computation of bilinear pairings consumes time, as the access structure of the attribute-based encryption scheme becomes more complex, the decryption computation amount of the attribute-based encryption scheme also increases linearly, and finally, the decryption load of the terminal is increased. With the development of wireless communication technology and the popularization of mobile devices, more and more users use mobile terminals to access a cloud platform. Compared with fixed terminals such as desktop computers and servers, the mobile terminal has better portability, but has more limited computing capability and storage resources, and is difficult to bear more complex computation. Therefore, in the face of the increasingly complex access structure of the attribute-based encryption scheme, the extremely increased decryption computation amount is undoubtedly a great challenge for the mobile terminal device.
Disclosure of Invention
The invention provides an outsourced multi-authorization center attribute-based encryption method, which mainly comprises two contents:
(1) outsourcing calculation and identity verification based on an collusion-free dual-server model;
(2) based on multiple rights issuer attribute management without a central rights issuer.
The specific contents are as follows:
the outsourced multi-authority attribute-based encryption method comprises the following ten algorithms:
(1) GlobalSetup (λ) → GP, global initialization algorithm. And inputting a safety parameter lambda and outputting a system global parameter GP. The system selects an order of N ═ p1p2p3The resultant order bilinear group G of (1), where the parameter λ is each prime factor p1,p2,p3The bit length of (c). The global parameter GP is N andone generator g of1Both of them are composed.
(2)AuthoritySetup(aid,GP,{i})→skaid,pkaidThe attribute authority initializes the algorithm. Each attribute authorization center runs the algorithm, inputs the identity authentication aid, the global parameter GP and the attribute set { i } authorized by the authorization center, and outputs the public and private key pair sk of the authorization centeraid,pkaid. The attribute authority sends pkaidPublish, will skaidIn this algorithm, for each attribute i that is affiliated with an authority aid, the authority randomly selects two prime numbers αi,yi∈ZN. For theWill be provided withAs a public key, { αi,yiAs a private key. Public keyPublic, private key { αi,yiPrivate collection.
(3) The data owner inputs plaintext m, an LSSS access structure (A, rho), a global parameter GP, a public key set { pk } corresponding to an attribute authority, outputs two ciphertexts ct1 and ct2 which are respectively sent to cloud servers 1 and 2, wherein A is an LSSS access matrix of n × l, and rho maps each line to a corresponding attribute, and the algorithm generates a random number s ∈ ZNGenerating a random vectorThe first term of the random vector v is s, generating a random vectorThe first term of the random vector w is 0. Get AxFor the x-th row of matrix A, for each AxGenerating a random number rx∈ZNDefine λx=Ax·v,ωx=Axω. The ciphertext is generated as follows: calculating C0=me(g1,g1)sGenerating a ciphertext ct2, and calculating The ciphertext ct1 is generated. The data owner sends the ciphertext ct1 to the cloud server 1 for storage, and sends the ciphertext ct2 to the cloud server 2 for storage.
(4)PersonalKeyGen(GID,GP,i,sk)→PersonalKeyi,GIDPersonal key generation algorithms. The user sends a request to the authorization center, the attribute authorization center runs the algorithm, the GID of the user, the global parameter GP, the attribute i granted by the authorization center and the corresponding private key sk are input, and the personal key of the user GID for the attribute i is outputAnd sending the data to the user.
(5)KeyGen(GP,i,PersonalKey)→Ki,GIDAnd decrypting the key generation algorithm. The user runs the algorithm and inputs the GID of the user, the global parameter GP, the attribute i granted by a certain authorization center and the personal key PersonalKeyi,GIDOutput decryption key for this attribute
(6)proxyKeyGen(ct1,{Ki,GID}, GP) → proxyKey, proxy key generation algorithm. The user runs the algorithm, inputs ct1 for the file to be decrypted, and derives the required set of decryption keys K from the access structurei,GIDGlobal parameter GP, output proxy key proxyKey ═ { due, h (gid), { Ki,GIDAnd } and sending the data to the cloud server 1.
(7) Trans (ct1, proxyKey, GP) → m', verifyproxy, outsourcing decryption algorithm. The cloud server 1 obtains the semi-decrypted ciphertext m' and the verification proxy key verifyproxy according to the proxy key proxyKey. Further, a cloud server
1, the tuuse is also scrambled to generate the tuuse ', so as to generate an authentication proxy key verifyproxy ═ tuuse', { K) used by the cloud server 2 to authenticate the identity of the useri,GID}}. The calculation of the semi-decrypted ciphertext m' takes advantage of the simple nature of bilinear mappingThe process is as follows:
take a constant such that ∑xcxAxIf (1, 0.., 0), then
(8) Randomselect (verifyproxy) → select, random selection algorithm. The cloud server 2 randomly selects a decryption key select K for a certain attribute from the authentication proxy key verifyproxy sent by the useri,GIDAnd sending the data to the user.
(9) Verify (personal key, GP, select) → true/false, Verify algorithm. The cloud server 2 returns a corresponding a contained in the PersonalKey returned by the useriAndgenerating decryption keysIf K'i,GID=Ki,GIDThen the verification is successful and the cloud server 2 sends ct2 to the user, otherwise it fails.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The invention relates to an outsourced multi-authorization center attribute-based encryption method, which comprises the following specific steps:
the outsourced multi-authorization-center attribute-based encryption method comprises five entities, namely an attribute authorization center(s), a data owner, a user, a cloud server 1 and a cloud server 2.
The method comprises the following steps: system initialization
The system is initialized, a global initialization algorithm is operated, and each user is allocated with a unique identity GID. Each authorization center runs an attribute authorization center initialization algorithm, and grants the corresponding attributes of the user according to the user identification GID, and the specific operation is that the authorization center generates a public and private key pair aiming at a certain attribute, a public key is disclosed, a private key is private, and a personal key generation algorithm is run according to the user GID to generate a personal key which is sent to the user. And the user runs a decryption key generation algorithm according to the personal key to generate and store a decryption key aiming at the attribute.
Step two: encrypting data
When the data owner wants to share the sensitive data, the data owner executes an encryption algorithm to upload the generated two parts of ciphertexts (the ciphertexts 1 and 2) to the cloud server 1 and the cloud server 2 respectively for storage.
Step three: outsourcing decryption and identity verification
When a user wants to acquire sensitive data, the user first sends an access request to the cloud server 1, runs a proxy key generation algorithm according to an access structure returned by the cloud server 1 to generate a proxy key, and sends the proxy key to the cloud server 1. Then, the cloud server 1 runs the outsource decryption algorithm to return the semi-decrypted ciphertext and the verification proxy key. Subsequently, the user forwards the authentication proxy key to the cloud server 2, the cloud server 2 runs a random selection algorithm to select one decryption key as K to be sent to the user, and the user returns the personal key for generating the decryption key. The cloud server 2 generates a decryption key K 'by using the received personal key, runs a verification algorithm, and if K is equal to K', it is indicated that the user identity is legal, and the cloud server 2 sends a ciphertext 2 to the user.
Step four: local decryption
And the user operates the local decryption algorithm to operate the semi-decrypted ciphertext and the ciphertext 2 to obtain the plaintext.
Claims (3)
1. An attribute-based encryption method capable of outsourcing multiple authorization centers is characterized by comprising the following steps:
1) outsourcing calculation and identity verification based on an collusion-free dual-server model;
2) based on multiple rights issuer attribute management without a central rights issuer.
2. The collusion-free dual-server model-based outsourcing computation and authentication of claim 1, wherein: the data owner encrypts locally, and the ciphertext is divided into two parts to be uploaded to two semi-honest unfconcubing cloud servers respectively. The cloud server 1 is responsible for ciphertext storage and outsourcing computation, and the cloud server 2 is responsible for ciphertext storage and identity verification. After the user sends the access request, the two cloud servers respectively carry out calculation and verification and then send the ciphertext to the user, and the user can obtain the plaintext only by carrying out simple operation on the two servers.
3. The centerless, multiple authority attribute management based on claim 1 wherein: either party may become the rights issuer by creating a public-private key pair that reflects the user's attributes. The method has no central authorization center, thereby avoiding performance bottleneck and potential safety hazard caused by over depending on one central authorization center.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010494444.0A CN111698083A (en) | 2020-06-03 | 2020-06-03 | Attribute-based encryption method capable of outsourcing multiple authorization centers |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010494444.0A CN111698083A (en) | 2020-06-03 | 2020-06-03 | Attribute-based encryption method capable of outsourcing multiple authorization centers |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111698083A true CN111698083A (en) | 2020-09-22 |
Family
ID=72479295
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010494444.0A Pending CN111698083A (en) | 2020-06-03 | 2020-06-03 | Attribute-based encryption method capable of outsourcing multiple authorization centers |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111698083A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104038341A (en) * | 2014-06-20 | 2014-09-10 | 北京航空航天大学 | Identity-based cross-system proxy re-encryption method |
CN108390876A (en) * | 2018-02-13 | 2018-08-10 | 西安电子科技大学 | Revocation outsourcing is supported to can verify that more authorization center access control methods, Cloud Server |
CN109768858A (en) * | 2018-12-26 | 2019-05-17 | 西安电子科技大学 | Based on the encryption attribute access control system more authorized and design method under cloud environment |
CN110933033A (en) * | 2019-10-27 | 2020-03-27 | 西安电子科技大学 | Cross-domain access control method for multiple Internet of things domains in smart city environment |
CN111079191A (en) * | 2020-01-09 | 2020-04-28 | 内蒙古大学 | CP-ABE access control scheme based on block chain |
-
2020
- 2020-06-03 CN CN202010494444.0A patent/CN111698083A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104038341A (en) * | 2014-06-20 | 2014-09-10 | 北京航空航天大学 | Identity-based cross-system proxy re-encryption method |
CN108390876A (en) * | 2018-02-13 | 2018-08-10 | 西安电子科技大学 | Revocation outsourcing is supported to can verify that more authorization center access control methods, Cloud Server |
CN109768858A (en) * | 2018-12-26 | 2019-05-17 | 西安电子科技大学 | Based on the encryption attribute access control system more authorized and design method under cloud environment |
CN110933033A (en) * | 2019-10-27 | 2020-03-27 | 西安电子科技大学 | Cross-domain access control method for multiple Internet of things domains in smart city environment |
CN111079191A (en) * | 2020-01-09 | 2020-04-28 | 内蒙古大学 | CP-ABE access control scheme based on block chain |
Non-Patent Citations (1)
Title |
---|
鲁黎明: ""基于CP-ABE的云访问控制技术研究"", 《中国优秀硕士学位论文全文数据库》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106961336B (en) | A kind of key components trustship method and system based on SM2 algorithm | |
AU2003202511B2 (en) | Methods for authenticating potential members invited to join a group | |
JP4866863B2 (en) | Security code generation method and user device | |
CN101720071B (en) | Short message two-stage encryption transmission and secure storage method based on safety SIM card | |
CN108352015A (en) | The anti-loss storage of Secure for the system combination wallet management system based on block chain and encryption key transfer | |
CN106487506B (en) | Multi-mechanism KP-ABE method supporting pre-encryption and outsourcing decryption | |
CN113067699B (en) | Data sharing method and device based on quantum key and computer equipment | |
CN110572258B (en) | Cloud password computing platform and computing service method | |
CN103259651A (en) | Encryption and decryption method and system of terminal data | |
CN102546600A (en) | Deputy-based encryption, decryption method, network equipment, network device and system | |
CN113708917B (en) | APP user data access control system and method based on attribute encryption | |
Yadav et al. | Mobile cloud computing issues and solution framework | |
Agarkhed et al. | An efficient auditing scheme for data storage security in cloud | |
CN102999710A (en) | Method, equipment and system for safely sharing digital content | |
Agarkhed et al. | Security and privacy for data storage service scheme in cloud computing | |
Chang et al. | Multi-user searchable encryption scheme with constant-size keys | |
Wala Aldeen Khairi | Framework For Modeling and Simulation of Secure Cloud Services | |
CN111698083A (en) | Attribute-based encryption method capable of outsourcing multiple authorization centers | |
Kumari | A Review: Different Challenges in Energy-Efficient Cloud Security | |
Sawle et al. | Survey on data classification and data encryption techniques used in cloud computing | |
Wu et al. | A privacy protection scheme for facial recognition and resolution based on edge computing | |
Swetha et al. | A Secured Cloud Environment with User Validation Method for Data Communication | |
Ramane et al. | A metadata verification scheme for data auditing in cloud environment | |
Gupta et al. | Data Security in Distributed Environments | |
Zkik et al. | New homomorphic platform for authentication and downloading data in MCC |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20200922 |