CN111901328A - Attribute-based encryption method based on prime order group - Google Patents
Attribute-based encryption method based on prime order group Download PDFInfo
- Publication number
- CN111901328A CN111901328A CN202010709247.6A CN202010709247A CN111901328A CN 111901328 A CN111901328 A CN 111901328A CN 202010709247 A CN202010709247 A CN 202010709247A CN 111901328 A CN111901328 A CN 111901328A
- Authority
- CN
- China
- Prior art keywords
- attribute
- access control
- private key
- user
- stage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3033—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an attribute-based encryption method based on prime order groups, which comprises the following steps: (1) the authentication center generates a prime order group and generates a public parameter and a main private key according to the security parameter; (2) the authentication center generates a user private key associated with the user attribute set according to the public parameter, the main private key and the user attribute set; (3) the data publisher encrypts a plaintext according to the public parameters and the required access control strategy, and outputs a ciphertext and the access control strategy only with the attribute name set; (4) and the data acquirer verifies whether the attribute set meets the access control strategy according to the private key, the public parameter and the ciphertext related to the personal attribute set, and then decrypts to acquire the plaintext. The invention is constructed based on prime order group, meets the complete safety of composite order group construction, effectively shortens the public parameter and the key length, simultaneously improves the operation and storage efficiency, and meets the operation and storage requirements of limited equipment in intelligent medical treatment.
Description
Technical Field
The invention relates to an encryption method applied to intelligent medical treatment, in particular to an attribute-based encryption method based on prime order groups.
Background
The intelligent medical treatment is a great innovation of the existing medical system, the intelligent medical system utilizes advanced technologies such as the Internet of things and the cloud, and the user side collects health data of the user in real time through intelligent wearable equipment and wireless sensors and uploads the data to the cloud through the network. The doctor can acquire user data from the cloud and give corresponding suggestions and treatment schemes.
Although intelligent medical treatment greatly improves medical efficiency through technologies such as cloud and internet of things, the problem of user data privacy is also brought. Because the health data of the users need to be uploaded to the cloud after being collected, the data of the cloud is shared, all the users can acquire the desired data through the cloud, and malicious users can acquire the privacy data of other users through the cloud, so that the privacy safety and the personal safety of legal users can be threatened.
The traditional public key encryption scheme can only meet the encryption and decryption of a single public and private key pair, and data encrypted by a public key can be decrypted only by a corresponding private key, does not have a flexible authorization and authentication function, and does not meet the requirement of data sharing on the cloud. Attribute-based encryption provides more flexible access control functionality, but a traditional ciphertext policy based on an attribute encryption scheme (CP-ABE) may include an access control policy in plaintext form in ciphertext, and upload the ciphertext to the cloud at the same time, while the access control structure may carry part of the user's private information, for example, the access control policy is "affinity: City Hospital and address: Cardiologist", which specifies that users with the attributes "City Hospital" and "Cardiologist" may decrypt, and other users may deduce that the encrypted information is related to heart disease although the user cannot decrypt, and the data publisher may have heart disease, which is not desired by the user.
Yinghui Zhang et al proposed an attribute-based encryption scheme with partially hidden policy (Zhang Y, ZhengD, Deng R H.Security and privacy in smart health: Efficient policy-based access control [ J ]. IEEE Internet of threads Journal,2018,5(3): 2130-.
However, in order to achieve complete security, the scheme of Yinghui Zhang et al is constructed based on a complex order group, the time required for the pairing and exponential operation on the complex order group is long, and the key and public parameter of the complex order group scheme are long, and the Aurore guillemic (guillemic a. matching the pairing and exponential over complex-order and prime-order iterative curves [ C ]// International Conference on applied cryptography and Network security. springer, Berlin, Heidelberg,2013:357 and 372.) studies and verifies that the construction efficiency of the complex order group is far lower than that of the prime number group construction, and suggests to avoid the complex group construction scheme as much as possible. The intelligent medical treatment can involve computing limited devices such as sensors, the storage resources and the computing resources of the devices are limited, and the scheme of Yinghui Zhuang and the like cannot completely meet the application scene of the intelligent medical treatment.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: aiming at the existing problems, the method can meet the requirement of flexible access control on data on the cloud, and meanwhile, based on a prime order group construction scheme, the method meets the requirements of efficient calculation and shorter keys of limited equipment in the Internet of things, and simultaneously meets the same complete safety property in the homozygote order group construction.
The technical scheme adopted by the invention is as follows:
an attribute-based encryption method based on prime order groups comprises the following steps:
(1) in the initialization stage, the authentication center generates a prime order group, and generates a public parameter and a main private key according to the security parameter:
(1.1) the authentication center selects two groups with the same prime order pAndand corresponding bilinear mapOrder toRandomly selecting 5-dimensional linearly independent vectors on 5 p-order finite fieldsAnd require for all i>2, i ≠ jWhen i is jRandomly selecting a generatorOrder toLet G1 be equal to<γ1,γ2>Represents G1Is a group formed by tuples consisting of the two elements, with the same pair 2 ≦ i ≦ 4, Gi=<γi+1>(ii) a Finally defining a pairing operation on a new groupOutputting the newly defined groups and corresponding pairing: (G, G)1,G2,G3,G4,Gt,e);
(1.2) setting the attribute field toThe alpha is randomly selected and the alpha is randomly selected,g,h∈RG1,X3∈RG3,Z,X4∈RG4calculating Y ═ e (g, g)αAnd H-hZ;
(1.3) outputting public parameter PK ═ N, ga,Y,H,X4) And the main private key MK ═ (alpha, h, X)3);
(2) In the key generation stage, the authentication center generates a user private key associated with the user attribute set according to the public parameters, the master private key and the user attribute set:
(2.1) the authentication center confirms the set of attributes of the user who needs to distribute the keyWhereinThe name of the attribute is represented by,representing the attribute value corresponding to the attribute name;
(3) and in the encryption stage, a data publisher encrypts a plaintext according to the public parameters and the required access control strategy, and outputs a ciphertext and the access control strategy only with the attribute name set:
(3.1) data publisher determines access control structures needed for decryptionWherein A is an l × n matrix; ρ is a mapping that maps each row A in the matrixxMapping to an attribute name;an attribute value representing a corresponding attribute name;
(3.2) for plaintext M ∈ GTRandomly selecting two vectorsWherein upsilon is (s, v)2,…,υn),υ′=(s′,υ′2,…,υ′n) (ii) a Based on X4Random selection of ZΔ∈RG4And ZΔ,x,Zc,x,Zd,x∈RG4Random selection of
and (3) outputting a ciphertext:
(4) in the decryption stage, a data acquirer verifies whether the attribute set meets an access control strategy according to a private key, a public parameter and a ciphertext related to the personal attribute set, and then obtains a plaintext through decryption:
(4.1) a verification stage: calculating I from (A, ρ)A,ρRepresenting a minimum set of attributes satisfying the access control structure, verifying whether the set of user attributes consists of a subsetSatisfy the requirement ofAndwherein the content of the first and second substances,is a constant set satisfiesIf it isIf not, it indicates that the decryptor data set does not satisfy the access control structure, and if calculatedEntering a decryption stage;
(4.2) decryption stage: and (3) calculating:
in summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
1. the invention is constructed based on prime order group, meets the complete safety of composite order group construction, can effectively shorten the public parameter and the key length, simultaneously improves the operation and storage efficiency, and meets the operation and storage requirements of limited equipment in intelligent medical treatment.
2. The invention is also a partially hidden attribute-based encryption method, can provide a flexible access control method, and hides the user privacy data value in the access control structure, thereby ensuring the privacy of the user data on the cloud.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 is a block diagram of a process of an attribute-based encryption method based on prime order groups according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the detailed description and specific examples, while indicating the preferred embodiment of the invention, are intended for purposes of illustration only and are not intended to limit the scope of the invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The features and properties of the present invention are described in further detail below with reference to examples.
As shown in fig. 1, an attribute-based encryption method based on prime order group includes the following steps:
(1) in the initialization stage, the authentication center generates a prime order group, and generates a public parameter and a main private key according to the security parameter:
(1.1) the authentication center selects two groups with the same prime order pAndand corresponding bilinear mapOrder toRandomly selecting 5-dimensional linearly independent vectors on 5 p-order finite fieldsAnd when all i > 2, i ≠ j are requiredWhen i is jRandomly selecting a generatorOrder toLet G1=<γ1,γ2>Represents G1Is a group formed by tuples consisting of the two elements, with the same pair 2 ≦ i ≦ 4, Gi=<γi+1>(ii) a Finally defining a pairing operation on a new groupOutputting the newly defined groups and corresponding pairing: (G, G)1,G2,G3,G4,Gt,e);
(1.2) setting the attribute field toThe alpha is randomly selected and the alpha is randomly selected,g,h∈RG1,X3∈RG3,Z,X4∈RG4calculating Y ═ e (g, g)αAnd H ═ HZ;
(1.3) outputting public parameter PK ═ N, ga,Y,H,X4) And the main private key MK ═ (alpha, h, X)3);
(2) In the key generation stage, the authentication center generates a user private key associated with the user attribute set according to the public parameters, the master private key and the user attribute set:
(2.1) the authentication center confirms the set of attributes of the user who needs to distribute the keyWhereinThe name of the attribute is represented by,representing the attribute value corresponding to the attribute name;
(3) and in the encryption stage, a data publisher encrypts a plaintext according to the public parameters and the required access control strategy, and outputs a ciphertext and the access control strategy only with the attribute name set:
(3.1) data publisher determines access control structures needed for decryptionWherein A is an l × n matrix; ρ is a mapping that maps each row A in the matrixxMapping to an attribute name;an attribute value representing a corresponding attribute name;
(3.2) for plaintext M ∈ GTRandomly selecting two vectorsWherein upsilon is (s, v)2,…,υn),υ′=(s′,υ′2,…,υ′n) (ii) a Based on X4Random selection of ZΔ∈RG4And ZΔ,x,Zc,x,Zd,x∈RG4Random selection of
and (3) outputting a ciphertext:
(4) in the decryption stage, a data acquirer verifies whether the attribute set meets an access control strategy according to a private key, a public parameter and a ciphertext related to the personal attribute set, and then obtains a plaintext through decryption:
(4.1) a verification stage: calculating I from (A, ρ)A,ρRepresenting a minimum set of attributes satisfying the access control structure, verifying whether the set of user attributes consists of a subsetSatisfy the requirement ofAndwherein the content of the first and second substances,is a constant set satisfiesIf it isIf not, it indicates that the decryptor data set does not satisfy the access control structure, and if calculatedEntering a decryption stage; the verification stage can quickly verify whether the attribute set of the decryptor meets the access control structure, decryption can be carried out after verification is passed, and plaintext information cannot be exposed even if ciphertext is not required to be decrypted in the verification stage;
(4.2) decryption stage: and (3) calculating:
the above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.
Claims (1)
1. An attribute-based encryption method based on prime order groups is characterized by comprising the following steps:
(1) in the initialization stage, the authentication center generates a prime order group, and generates a public parameter and a main private key according to the security parameter:
(1.1) the authentication center selects two groups with the same prime order pAndand corresponding bilinear map Order toRandomly selecting 5-dimensional linearly independent vectors on 5 p-order finite fieldsAnd when all i > 2, i ≠ j are requiredWhen i is jRandomly selecting a generatorOrder toLet G1=<γ1,γ2>Represents G1Is a group formed by tuples consisting of the two elements, with the same pair 2 ≦ i ≦ 4, Gi=<γi+1Above (S); finally defining a pairing operation on a new groupOutputting the newly defined groups and corresponding pairing: (G, G)1,G2,G3,G4,Gt,e);
(1.2) setting the attribute field toThe alpha is randomly selected and the alpha is randomly selected,g,h∈RG1,X3∈RG3,Z,X4∈RG4calculating Y ═ e (g, g)αAnd H-hZ;
(1.3) outputting public parameter PK ═ N, ga,Y,H,X4) And the main private key MK ═ (alpha, h, X)3);
(2) In the key generation stage, the authentication center generates a user private key associated with the user attribute set according to the public parameters, the master private key and the user attribute set:
(2.1) the authentication center confirms the set of attributes of the user who needs to distribute the keyWhereinThe name of the attribute is represented by,representing the attribute value corresponding to the attribute name;
(3) and in the encryption stage, a data publisher encrypts a plaintext according to the public parameters and the required access control strategy, and outputs a ciphertext and the access control strategy only with the attribute name set:
(3.1) data publisher determines access control structures needed for decryptionWherein A is an l × n matrix; ρ is a mapping that maps each row A in the matrixxMapping to an attribute name;an attribute value representing a corresponding attribute name;
(3.2) for plaintext M ∈ GTTwo vectors v are randomly selected,wherein upsilon ═ s,υ2,…,υn),υ′=(s′,υ′2,…,υ′n) (ii) a Based on X4Random selection of ZΔ∈RG4And ZΔ,x,Zc,x,Zd,x∈RG4Random selection of
and (3) outputting a ciphertext:
(4) in the decryption stage, a data acquirer verifies whether the attribute set meets an access control strategy according to a private key, a public parameter and a ciphertext related to the personal attribute set, and then obtains a plaintext through decryption:
(4.1) a verification stage: calculating I from (A, ρ)A,ρRepresenting a minimum set of attributes satisfying the access control structure, verifying whether the set of user attributes consists of a subsetSatisfy the requirement ofAndwherein the content of the first and second substances,is a constant set satisfiesIf it isIf not, it indicates that the decryptor data set does not satisfy the access control structure, and if calculatedEntering a decryption stage;
(4.2) decryption stage: and (3) calculating:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010709247.6A CN111901328B (en) | 2020-07-22 | 2020-07-22 | Attribute-based encryption method based on prime order group |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010709247.6A CN111901328B (en) | 2020-07-22 | 2020-07-22 | Attribute-based encryption method based on prime order group |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111901328A true CN111901328A (en) | 2020-11-06 |
CN111901328B CN111901328B (en) | 2021-08-06 |
Family
ID=73190808
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010709247.6A Active CN111901328B (en) | 2020-07-22 | 2020-07-22 | Attribute-based encryption method based on prime order group |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111901328B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114189340A (en) * | 2021-12-09 | 2022-03-15 | 电子科技大学 | Attribute-based signature method based on prime order group |
CN114567466A (en) * | 2022-02-17 | 2022-05-31 | 安徽师范大学 | CP-ABE strategy hiding-based high-efficiency fine-grained access control method |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104363215A (en) * | 2014-11-04 | 2015-02-18 | 河海大学 | Encryption method and system based on attributes |
EP3002904A1 (en) * | 2014-10-01 | 2016-04-06 | Thomson Licensing | Method for ciphering/deciphering and processing vectors of dimension n, where n is an integer greater or equal to 1 |
CN106686010A (en) * | 2017-03-08 | 2017-05-17 | 河南理工大学 | Multi-mechanism attribute-based encryption method supporting strategy dynamic updating |
CN107181590A (en) * | 2017-04-14 | 2017-09-19 | 南京邮电大学 | Strategy hides the anti-leakage CP ABE methods under being decrypted with outsourcing |
CN107241321A (en) * | 2017-05-26 | 2017-10-10 | 陕西科技大学 | A kind of personal medical information method for secret protection |
CN107508667A (en) * | 2017-07-10 | 2017-12-22 | 中国人民解放军信息工程大学 | Ciphertext policy ABE base encryption method and its device of the fix duty without key escrow can be disclosed |
CN107682353A (en) * | 2017-10-25 | 2018-02-09 | 西安邮电大学 | A kind of health account access control system and method in electron medical treatment cloud |
CN109246096A (en) * | 2018-08-30 | 2019-01-18 | 西安电子科技大学 | Multi-functional fine-grained access control method suitable for cloud storage |
CN110086615A (en) * | 2019-05-06 | 2019-08-02 | 福建师范大学 | A kind of more authorized party's ciphertext policy ABE base encryption methods of distribution that medium is obscured |
-
2020
- 2020-07-22 CN CN202010709247.6A patent/CN111901328B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3002904A1 (en) * | 2014-10-01 | 2016-04-06 | Thomson Licensing | Method for ciphering/deciphering and processing vectors of dimension n, where n is an integer greater or equal to 1 |
CN104363215A (en) * | 2014-11-04 | 2015-02-18 | 河海大学 | Encryption method and system based on attributes |
CN106686010A (en) * | 2017-03-08 | 2017-05-17 | 河南理工大学 | Multi-mechanism attribute-based encryption method supporting strategy dynamic updating |
CN107181590A (en) * | 2017-04-14 | 2017-09-19 | 南京邮电大学 | Strategy hides the anti-leakage CP ABE methods under being decrypted with outsourcing |
CN107241321A (en) * | 2017-05-26 | 2017-10-10 | 陕西科技大学 | A kind of personal medical information method for secret protection |
CN107508667A (en) * | 2017-07-10 | 2017-12-22 | 中国人民解放军信息工程大学 | Ciphertext policy ABE base encryption method and its device of the fix duty without key escrow can be disclosed |
CN107682353A (en) * | 2017-10-25 | 2018-02-09 | 西安邮电大学 | A kind of health account access control system and method in electron medical treatment cloud |
CN109246096A (en) * | 2018-08-30 | 2019-01-18 | 西安电子科技大学 | Multi-functional fine-grained access control method suitable for cloud storage |
CN110086615A (en) * | 2019-05-06 | 2019-08-02 | 福建师范大学 | A kind of more authorized party's ciphertext policy ABE base encryption methods of distribution that medium is obscured |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114189340A (en) * | 2021-12-09 | 2022-03-15 | 电子科技大学 | Attribute-based signature method based on prime order group |
CN114567466A (en) * | 2022-02-17 | 2022-05-31 | 安徽师范大学 | CP-ABE strategy hiding-based high-efficiency fine-grained access control method |
Also Published As
Publication number | Publication date |
---|---|
CN111901328B (en) | 2021-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hu et al. | Secure and efficient data communication protocol for wireless body area networks | |
CN108881314B (en) | Privacy protection method and system based on CP-ABE ciphertext under fog computing environment | |
CN104363215B (en) | A kind of encryption method and system based on attribute | |
CN108322447B (en) | Data sharing method and system under cloud environment, terminal and cloud server | |
CN111986755A (en) | Data sharing system based on block chain and attribute-based encryption | |
CN111447192B (en) | Lightweight attribute base signcryption method for cloud and mist assisted Internet of things | |
CN110197081B (en) | Cloud data sharing privacy protection method based on block chain | |
CN106656997B (en) | One kind being based on the cross-domain friend-making method for secret protection of mobile social networking proxy re-encryption | |
CN113761557A (en) | Multi-party deep learning privacy protection method based on fully homomorphic encryption algorithm | |
CN110933033A (en) | Cross-domain access control method for multiple Internet of things domains in smart city environment | |
CN111901328B (en) | Attribute-based encryption method based on prime order group | |
CN111274594B (en) | Block chain-based secure big data privacy protection sharing method | |
CN105897742B (en) | Anonymous Identity base access control method applied to electronic health care network | |
CN113836222B (en) | Access control method of concealable strategy and attribute based on block chain | |
CN105141419B (en) | The attribute base endorsement method and system in large attribute domain | |
CN111431898A (en) | Multi-attribute mechanism attribute-based encryption method with search function for cloud-assisted Internet of things | |
CN111581648B (en) | Method of federal learning to preserve privacy in irregular users | |
Liu et al. | Anonymous electronic health record sharing scheme based on decentralized hierarchical attribute-based encryption in cloud environment | |
CN113411323A (en) | Medical record data access control system and method based on attribute encryption | |
CN110752024A (en) | Online medical diagnosis service system based on privacy protection | |
CN116112244A (en) | Access control method based on blockchain and attribute-based encryption | |
CN113626831A (en) | CP-ABE method supporting privacy protection and decryption in cloud | |
CN105978895A (en) | Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation | |
CN116073997A (en) | Customizable data access control method, system and computer readable storage medium | |
CN116055177A (en) | Lightweight authentication and key negotiation method suitable for Internet of things equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |