CN111901320B - 基于属性撤销cp-abe的抗密钥伪造攻击加密方法及其系统 - Google Patents
基于属性撤销cp-abe的抗密钥伪造攻击加密方法及其系统 Download PDFInfo
- Publication number
- CN111901320B CN111901320B CN202010686281.6A CN202010686281A CN111901320B CN 111901320 B CN111901320 B CN 111901320B CN 202010686281 A CN202010686281 A CN 202010686281A CN 111901320 B CN111901320 B CN 111901320B
- Authority
- CN
- China
- Prior art keywords
- key
- attribute
- user
- cloud server
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010686281.6A CN111901320B (zh) | 2020-07-16 | 2020-07-16 | 基于属性撤销cp-abe的抗密钥伪造攻击加密方法及其系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010686281.6A CN111901320B (zh) | 2020-07-16 | 2020-07-16 | 基于属性撤销cp-abe的抗密钥伪造攻击加密方法及其系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111901320A CN111901320A (zh) | 2020-11-06 |
CN111901320B true CN111901320B (zh) | 2021-05-11 |
Family
ID=73189199
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010686281.6A Active CN111901320B (zh) | 2020-07-16 | 2020-07-16 | 基于属性撤销cp-abe的抗密钥伪造攻击加密方法及其系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111901320B (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112565223B (zh) * | 2020-11-27 | 2022-11-04 | 东莞职业技术学院 | 面向物联网的属性加密访问控制的方法、系统及存储介质 |
CN113301042B (zh) * | 2021-05-20 | 2022-06-17 | 南开大学 | 一种负载均衡的隐私数据共享方法 |
CN113489732B (zh) * | 2021-07-13 | 2023-07-04 | 郑州轻工业大学 | 一种抵御串谋攻击的内容共享隐私保护方法 |
CN116132048A (zh) * | 2023-01-04 | 2023-05-16 | 扬州大学 | 一种适用于医疗物联网场景下用户隐私数据安全共享的方法 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108390876A (zh) * | 2018-02-13 | 2018-08-10 | 西安电子科技大学 | 支持撤销外包可验证多授权中心访问控制方法、云服务器 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SG10201508390PA (en) * | 2015-10-09 | 2017-05-30 | Singapore Man University | Data security system and method for operation thereof |
CN108810004B (zh) * | 2018-06-22 | 2020-08-04 | 西安电子科技大学 | 基于代理的可撤销多授权中心访问控制方法、云存储系统 |
CN110035067B (zh) * | 2019-03-13 | 2022-03-25 | 西安电子科技大学 | 云存储中支持高效数据去重和属性撤销的属性加密方法 |
CN110138561B (zh) * | 2019-03-22 | 2021-09-17 | 西安电子科技大学 | 基于cp-abe自动校正的高效密文检索方法、云计算服务系统 |
CN110099043B (zh) * | 2019-03-24 | 2021-09-17 | 西安电子科技大学 | 支持策略隐藏的多授权中心访问控制方法、云存储系统 |
CN110602063A (zh) * | 2019-08-27 | 2019-12-20 | 西安电子科技大学 | 一种多授权中心访问控制方法、系统及云存储系统 |
-
2020
- 2020-07-16 CN CN202010686281.6A patent/CN111901320B/zh active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108390876A (zh) * | 2018-02-13 | 2018-08-10 | 西安电子科技大学 | 支持撤销外包可验证多授权中心访问控制方法、云服务器 |
Also Published As
Publication number | Publication date |
---|---|
CN111901320A (zh) | 2020-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111901320B (zh) | 基于属性撤销cp-abe的抗密钥伪造攻击加密方法及其系统 | |
CN110300112B (zh) | 区块链密钥分层管理方法 | |
Nabeel et al. | Privacy preserving policy-based content sharing in public clouds | |
CN111523133B (zh) | 一种区块链与云端数据协同共享方法 | |
US6389136B1 (en) | Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys | |
Huang et al. | Achieving accountable and efficient data sharing in industrial internet of things | |
CN111526197B (zh) | 一种云端数据安全共享方法 | |
CN111342976B (zh) | 一种可验证的理想格上门限代理重加密方法及系统 | |
CN114039790B (zh) | 一种基于区块链的细粒度云存储安全访问控制方法 | |
CN110933033B (zh) | 智慧城市环境下多物联网域的跨域访问控制方法 | |
JP2011130120A (ja) | 量子公開鍵暗号システム、鍵生成装置、暗号化装置、復号装置、鍵生成方法、暗号化方法、及び復号方法 | |
Tiwari et al. | SecCloudSharing: Secure data sharing in public cloud using ciphertext‐policy attribute‐based proxy re‐encryption with revocation | |
CN113360944A (zh) | 一种电力物联网的动态访问控制系统与方法 | |
CN115001730B (zh) | 分布式场景下基于角色属性的访问控制系统及方法 | |
WO2007142170A1 (ja) | 不正者失効システム、暗号化装置、暗号化方法およびプログラム | |
Fugkeaw | A lightweight policy update scheme for outsourced personal health records sharing | |
Abo-Alian et al. | Auditing-as-a-service for cloud storage | |
CN111585756B (zh) | 一种适用于多副本-多云情形下的无证书云审计方法 | |
Kanagamani et al. | Zero knowledge based data deduplication using in-line Block Matching protocolfor secure cloud storage | |
Yan et al. | Revocable ciphertext-policy attribute-based encryption in data outsourcing systems from lattices | |
Chaudhari et al. | Towards lightweight provable data possession for cloud storage using indistinguishability obfuscation | |
Neela et al. | A Hybrid Cryptography Technique with Blockchain for Data Integrity and Confidentiality in Cloud Computing | |
Karrothu et al. | A systematic analysis of identity based encryption (IBE) | |
Sey et al. | Wb-Proxshare: A Warrant-Based Proxy Re-Encryption Model for Secure Data Sharing in Iot Networks Via Blockchain | |
CN107493305A (zh) | 数据加密方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information |
Inventor after: Peng Dehong Inventor after: Zhang Wenfang Inventor after: Ma Zheng Inventor after: Wang Xiaomin Inventor before: Zhang Wenfang Inventor before: Peng Dehong Inventor before: Wang Xiaomin Inventor before: Ma Zheng |
|
CB03 | Change of inventor or designer information | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230317 Address after: Room 801, 85 Kefeng Road, Huangpu District, Guangzhou City, Guangdong Province Patentee after: Yami Technology (Guangzhou) Co.,Ltd. Address before: 610031 No. two, section 111, ring road, Chengdu, Sichuan, China Patentee before: SOUTHWEST JIAOTONG University |
|
TR01 | Transfer of patent right |