CN111901328A - Attribute-based encryption method based on prime order group - Google Patents

Attribute-based encryption method based on prime order group Download PDF

Info

Publication number
CN111901328A
CN111901328A CN202010709247.6A CN202010709247A CN111901328A CN 111901328 A CN111901328 A CN 111901328A CN 202010709247 A CN202010709247 A CN 202010709247A CN 111901328 A CN111901328 A CN 111901328A
Authority
CN
China
Prior art keywords
attribute
access control
private key
user
stage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010709247.6A
Other languages
Chinese (zh)
Other versions
CN111901328B (en
Inventor
廖永建
甘廷赟
张刚林
梁艺宽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN202010709247.6A priority Critical patent/CN111901328B/en
Publication of CN111901328A publication Critical patent/CN111901328A/en
Application granted granted Critical
Publication of CN111901328B publication Critical patent/CN111901328B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3033Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an attribute-based encryption method based on prime order groups, which comprises the following steps: (1) the authentication center generates a prime order group and generates a public parameter and a main private key according to the security parameter; (2) the authentication center generates a user private key associated with the user attribute set according to the public parameter, the main private key and the user attribute set; (3) the data publisher encrypts a plaintext according to the public parameters and the required access control strategy, and outputs a ciphertext and the access control strategy only with the attribute name set; (4) and the data acquirer verifies whether the attribute set meets the access control strategy according to the private key, the public parameter and the ciphertext related to the personal attribute set, and then decrypts to acquire the plaintext. The invention is constructed based on prime order group, meets the complete safety of composite order group construction, effectively shortens the public parameter and the key length, simultaneously improves the operation and storage efficiency, and meets the operation and storage requirements of limited equipment in intelligent medical treatment.

Description

Attribute-based encryption method based on prime order group
Technical Field
The invention relates to an encryption method applied to intelligent medical treatment, in particular to an attribute-based encryption method based on prime order groups.
Background
The intelligent medical treatment is a great innovation of the existing medical system, the intelligent medical system utilizes advanced technologies such as the Internet of things and the cloud, and the user side collects health data of the user in real time through intelligent wearable equipment and wireless sensors and uploads the data to the cloud through the network. The doctor can acquire user data from the cloud and give corresponding suggestions and treatment schemes.
Although intelligent medical treatment greatly improves medical efficiency through technologies such as cloud and internet of things, the problem of user data privacy is also brought. Because the health data of the users need to be uploaded to the cloud after being collected, the data of the cloud is shared, all the users can acquire the desired data through the cloud, and malicious users can acquire the privacy data of other users through the cloud, so that the privacy safety and the personal safety of legal users can be threatened.
The traditional public key encryption scheme can only meet the encryption and decryption of a single public and private key pair, and data encrypted by a public key can be decrypted only by a corresponding private key, does not have a flexible authorization and authentication function, and does not meet the requirement of data sharing on the cloud. Attribute-based encryption provides more flexible access control functionality, but a traditional ciphertext policy based on an attribute encryption scheme (CP-ABE) may include an access control policy in plaintext form in ciphertext, and upload the ciphertext to the cloud at the same time, while the access control structure may carry part of the user's private information, for example, the access control policy is "affinity: City Hospital and address: Cardiologist", which specifies that users with the attributes "City Hospital" and "Cardiologist" may decrypt, and other users may deduce that the encrypted information is related to heart disease although the user cannot decrypt, and the data publisher may have heart disease, which is not desired by the user.
Yinghui Zhang et al proposed an attribute-based encryption scheme with partially hidden policy (Zhang Y, ZhengD, Deng R H.Security and privacy in smart health: Efficient policy-based access control [ J ]. IEEE Internet of threads Journal,2018,5(3): 2130-.
However, in order to achieve complete security, the scheme of Yinghui Zhang et al is constructed based on a complex order group, the time required for the pairing and exponential operation on the complex order group is long, and the key and public parameter of the complex order group scheme are long, and the Aurore guillemic (guillemic a. matching the pairing and exponential over complex-order and prime-order iterative curves [ C ]// International Conference on applied cryptography and Network security. springer, Berlin, Heidelberg,2013:357 and 372.) studies and verifies that the construction efficiency of the complex order group is far lower than that of the prime number group construction, and suggests to avoid the complex group construction scheme as much as possible. The intelligent medical treatment can involve computing limited devices such as sensors, the storage resources and the computing resources of the devices are limited, and the scheme of Yinghui Zhuang and the like cannot completely meet the application scene of the intelligent medical treatment.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: aiming at the existing problems, the method can meet the requirement of flexible access control on data on the cloud, and meanwhile, based on a prime order group construction scheme, the method meets the requirements of efficient calculation and shorter keys of limited equipment in the Internet of things, and simultaneously meets the same complete safety property in the homozygote order group construction.
The technical scheme adopted by the invention is as follows:
an attribute-based encryption method based on prime order groups comprises the following steps:
(1) in the initialization stage, the authentication center generates a prime order group, and generates a public parameter and a main private key according to the security parameter:
(1.1) the authentication center selects two groups with the same prime order p
Figure BDA0002595938110000031
And
Figure BDA0002595938110000032
and corresponding bilinear map
Figure BDA0002595938110000033
Order to
Figure BDA0002595938110000034
Randomly selecting 5-dimensional linearly independent vectors on 5 p-order finite fields
Figure BDA0002595938110000035
And require for all i>2, i ≠ j
Figure BDA0002595938110000036
When i is j
Figure BDA0002595938110000037
Randomly selecting a generator
Figure BDA0002595938110000038
Order to
Figure BDA0002595938110000039
Let G1 be equal to<γ1,γ2>Represents G1Is a group formed by tuples consisting of the two elements, with the same pair 2 ≦ i ≦ 4, Gi=<γi+1>(ii) a Finally defining a pairing operation on a new group
Figure BDA00025959381100000310
Outputting the newly defined groups and corresponding pairing: (G, G)1,G2,G3,G4,Gt,e);
(1.2) setting the attribute field to
Figure BDA00025959381100000311
The alpha is randomly selected and the alpha is randomly selected,
Figure BDA00025959381100000312
g,h∈RG1,X3RG3,Z,X4RG4calculating Y ═ e (g, g)αAnd H-hZ;
(1.3) outputting public parameter PK ═ N, ga,Y,H,X4) And the main private key MK ═ (alpha, h, X)3);
(2) In the key generation stage, the authentication center generates a user private key associated with the user attribute set according to the public parameters, the master private key and the user attribute set:
(2.1) the authentication center confirms the set of attributes of the user who needs to distribute the key
Figure BDA00025959381100000313
Wherein
Figure BDA00025959381100000314
The name of the attribute is represented by,
Figure BDA00025959381100000315
representing the attribute value corresponding to the attribute name;
(2.2) random selection
Figure BDA00025959381100000316
And R, R', Ri ∈RG3Wherein
Figure BDA00025959381100000317
Calculating K ═ gαgatR,K′=gtR′,
Figure BDA00025959381100000318
(2.3) outputting the private key of the user
Figure BDA00025959381100000319
And sending to the user;
(3) and in the encryption stage, a data publisher encrypts a plaintext according to the public parameters and the required access control strategy, and outputs a ciphertext and the access control strategy only with the attribute name set:
(3.1) data publisher determines access control structures needed for decryption
Figure BDA00025959381100000320
Wherein A is an l × n matrix; ρ is a mapping that maps each row A in the matrixxMapping to an attribute name;
Figure BDA0002595938110000041
an attribute value representing a corresponding attribute name;
(3.2) for plaintext M ∈ GTRandomly selecting two vectors
Figure BDA0002595938110000042
Wherein upsilon is (s, v)2,…,υn),υ′=(s′,υ′2,…,υ′n) (ii) a Based on X4Random selection of ZΔRG4And ZΔ,x,Zc,x,Zd,xRG4Random selection of
Figure BDA0002595938110000043
(3.3) calculation of
Figure BDA0002595938110000044
Figure BDA0002595938110000045
And
Figure BDA0002595938110000046
and (3) outputting a ciphertext:
Figure BDA0002595938110000047
(4) in the decryption stage, a data acquirer verifies whether the attribute set meets an access control strategy according to a private key, a public parameter and a ciphertext related to the personal attribute set, and then obtains a plaintext through decryption:
(4.1) a verification stage: calculating I from (A, ρ)A,ρRepresenting a minimum set of attributes satisfying the access control structure, verifying whether the set of user attributes consists of a subset
Figure BDA0002595938110000048
Satisfy the requirement of
Figure BDA0002595938110000049
And
Figure BDA00025959381100000410
wherein the content of the first and second substances,
Figure BDA00025959381100000411
is a constant set satisfies
Figure BDA00025959381100000412
If it is
Figure BDA00025959381100000413
If not, it indicates that the decryptor data set does not satisfy the access control structure, and if calculated
Figure BDA00025959381100000414
Entering a decryption stage;
(4.2) decryption stage: and (3) calculating:
Figure BDA00025959381100000415
then, the plaintext is obtained through decryption:
Figure BDA00025959381100000416
in summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
1. the invention is constructed based on prime order group, meets the complete safety of composite order group construction, can effectively shorten the public parameter and the key length, simultaneously improves the operation and storage efficiency, and meets the operation and storage requirements of limited equipment in intelligent medical treatment.
2. The invention is also a partially hidden attribute-based encryption method, can provide a flexible access control method, and hides the user privacy data value in the access control structure, thereby ensuring the privacy of the user data on the cloud.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 is a block diagram of a process of an attribute-based encryption method based on prime order groups according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the detailed description and specific examples, while indicating the preferred embodiment of the invention, are intended for purposes of illustration only and are not intended to limit the scope of the invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The features and properties of the present invention are described in further detail below with reference to examples.
As shown in fig. 1, an attribute-based encryption method based on prime order group includes the following steps:
(1) in the initialization stage, the authentication center generates a prime order group, and generates a public parameter and a main private key according to the security parameter:
(1.1) the authentication center selects two groups with the same prime order p
Figure BDA0002595938110000061
And
Figure BDA0002595938110000062
and corresponding bilinear map
Figure BDA0002595938110000063
Order to
Figure BDA0002595938110000064
Randomly selecting 5-dimensional linearly independent vectors on 5 p-order finite fields
Figure BDA0002595938110000065
And when all i > 2, i ≠ j are required
Figure BDA0002595938110000066
When i is j
Figure BDA0002595938110000067
Randomly selecting a generator
Figure BDA0002595938110000068
Order to
Figure BDA0002595938110000069
Let G1=<γ1,γ2>Represents G1Is a group formed by tuples consisting of the two elements, with the same pair 2 ≦ i ≦ 4, Gi=<γi+1>(ii) a Finally defining a pairing operation on a new group
Figure BDA00025959381100000610
Outputting the newly defined groups and corresponding pairing: (G, G)1,G2,G3,G4,Gt,e);
(1.2) setting the attribute field to
Figure BDA00025959381100000611
The alpha is randomly selected and the alpha is randomly selected,
Figure BDA00025959381100000612
g,h∈RG1,X3RG3,Z,X4RG4calculating Y ═ e (g, g)αAnd H ═ HZ;
(1.3) outputting public parameter PK ═ N, ga,Y,H,X4) And the main private key MK ═ (alpha, h, X)3);
(2) In the key generation stage, the authentication center generates a user private key associated with the user attribute set according to the public parameters, the master private key and the user attribute set:
(2.1) the authentication center confirms the set of attributes of the user who needs to distribute the key
Figure BDA00025959381100000613
Wherein
Figure BDA00025959381100000614
The name of the attribute is represented by,
Figure BDA00025959381100000615
representing the attribute value corresponding to the attribute name;
(2.2) random selection
Figure BDA00025959381100000616
And R, R', RiRG3Wherein
Figure BDA00025959381100000617
Calculating K ═ gαgatR,K′=gtR′,Ki=(gsih)tRi
(2.3) outputting the private key of the user
Figure BDA00025959381100000618
And sending to the user;
(3) and in the encryption stage, a data publisher encrypts a plaintext according to the public parameters and the required access control strategy, and outputs a ciphertext and the access control strategy only with the attribute name set:
(3.1) data publisher determines access control structures needed for decryption
Figure BDA00025959381100000619
Wherein A is an l × n matrix; ρ is a mapping that maps each row A in the matrixxMapping to an attribute name;
Figure BDA00025959381100000620
an attribute value representing a corresponding attribute name;
(3.2) for plaintext M ∈ GTRandomly selecting two vectors
Figure BDA00025959381100000621
Wherein upsilon is (s, v)2,…,υn),υ′=(s′,υ′2,…,υ′n) (ii) a Based on X4Random selection of ZΔRG4And ZΔ,x,Zc,x,Zd,xRG4Random selection of
Figure BDA0002595938110000071
(3.3) calculation of
Figure BDA0002595938110000072
Figure BDA0002595938110000073
And
Figure BDA0002595938110000074
and (3) outputting a ciphertext:
Figure BDA0002595938110000075
(4) in the decryption stage, a data acquirer verifies whether the attribute set meets an access control strategy according to a private key, a public parameter and a ciphertext related to the personal attribute set, and then obtains a plaintext through decryption:
(4.1) a verification stage: calculating I from (A, ρ)A,ρRepresenting a minimum set of attributes satisfying the access control structure, verifying whether the set of user attributes consists of a subset
Figure BDA0002595938110000076
Satisfy the requirement of
Figure BDA0002595938110000077
And
Figure BDA0002595938110000078
wherein the content of the first and second substances,
Figure BDA0002595938110000079
is a constant set satisfies
Figure BDA00025959381100000710
If it is
Figure BDA00025959381100000711
If not, it indicates that the decryptor data set does not satisfy the access control structure, and if calculated
Figure BDA00025959381100000712
Entering a decryption stage; the verification stage can quickly verify whether the attribute set of the decryptor meets the access control structure, decryption can be carried out after verification is passed, and plaintext information cannot be exposed even if ciphertext is not required to be decrypted in the verification stage;
(4.2) decryption stage: and (3) calculating:
Figure BDA00025959381100000713
then, the plaintext is obtained through decryption:
Figure BDA00025959381100000714
the above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (1)

1. An attribute-based encryption method based on prime order groups is characterized by comprising the following steps:
(1) in the initialization stage, the authentication center generates a prime order group, and generates a public parameter and a main private key according to the security parameter:
(1.1) the authentication center selects two groups with the same prime order p
Figure FDA0002595938100000011
And
Figure FDA0002595938100000012
and corresponding bilinear map
Figure FDA0002595938100000013
Figure FDA0002595938100000014
Order to
Figure FDA0002595938100000015
Randomly selecting 5-dimensional linearly independent vectors on 5 p-order finite fields
Figure FDA0002595938100000016
And when all i > 2, i ≠ j are required
Figure FDA0002595938100000017
When i is j
Figure FDA0002595938100000018
Randomly selecting a generator
Figure FDA0002595938100000019
Order to
Figure FDA00025959381000000110
Let G1=<γ1,γ2>Represents G1Is a group formed by tuples consisting of the two elements, with the same pair 2 ≦ i ≦ 4, Gi=<γi+1Above (S); finally defining a pairing operation on a new group
Figure FDA00025959381000000111
Outputting the newly defined groups and corresponding pairing: (G, G)1,G2,G3,G4,Gt,e);
(1.2) setting the attribute field to
Figure FDA00025959381000000112
The alpha is randomly selected and the alpha is randomly selected,
Figure FDA00025959381000000113
g,h∈RG1,X3RG3,Z,X4RG4calculating Y ═ e (g, g)αAnd H-hZ;
(1.3) outputting public parameter PK ═ N, ga,Y,H,X4) And the main private key MK ═ (alpha, h, X)3);
(2) In the key generation stage, the authentication center generates a user private key associated with the user attribute set according to the public parameters, the master private key and the user attribute set:
(2.1) the authentication center confirms the set of attributes of the user who needs to distribute the key
Figure FDA00025959381000000114
Wherein
Figure FDA00025959381000000115
The name of the attribute is represented by,
Figure FDA00025959381000000116
representing the attribute value corresponding to the attribute name;
(2.2) random selection
Figure FDA00025959381000000117
And R, R', RiRG3Wherein
Figure FDA00025959381000000118
Calculating K ═ gαgatR,K′=gtR′,
Figure FDA00025959381000000119
(2.3) outputting the private key of the user
Figure FDA00025959381000000120
And sending to the user;
(3) and in the encryption stage, a data publisher encrypts a plaintext according to the public parameters and the required access control strategy, and outputs a ciphertext and the access control strategy only with the attribute name set:
(3.1) data publisher determines access control structures needed for decryption
Figure FDA00025959381000000121
Wherein A is an l × n matrix; ρ is a mapping that maps each row A in the matrixxMapping to an attribute name;
Figure FDA0002595938100000021
an attribute value representing a corresponding attribute name;
(3.2) for plaintext M ∈ GTTwo vectors v are randomly selected,
Figure FDA0002595938100000022
wherein upsilon ═ s,υ2,…,υn),υ′=(s′,υ′2,…,υ′n) (ii) a Based on X4Random selection of ZΔRG4And ZΔ,x,Zc,x,Zd,xRG4Random selection of
Figure FDA0002595938100000023
(3.3) calculation of
Figure FDA0002595938100000024
Figure FDA0002595938100000025
And
Figure FDA0002595938100000026
and (3) outputting a ciphertext:
Figure FDA0002595938100000027
(4) in the decryption stage, a data acquirer verifies whether the attribute set meets an access control strategy according to a private key, a public parameter and a ciphertext related to the personal attribute set, and then obtains a plaintext through decryption:
(4.1) a verification stage: calculating I from (A, ρ)A,ρRepresenting a minimum set of attributes satisfying the access control structure, verifying whether the set of user attributes consists of a subset
Figure FDA0002595938100000028
Satisfy the requirement of
Figure FDA0002595938100000029
And
Figure FDA00025959381000000210
wherein the content of the first and second substances,
Figure FDA00025959381000000211
is a constant set satisfies
Figure FDA00025959381000000212
If it is
Figure FDA00025959381000000213
If not, it indicates that the decryptor data set does not satisfy the access control structure, and if calculated
Figure FDA00025959381000000214
Entering a decryption stage;
(4.2) decryption stage: and (3) calculating:
Figure FDA00025959381000000215
then, the plaintext is obtained through decryption:
Figure FDA00025959381000000216
CN202010709247.6A 2020-07-22 2020-07-22 Attribute-based encryption method based on prime order group Active CN111901328B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010709247.6A CN111901328B (en) 2020-07-22 2020-07-22 Attribute-based encryption method based on prime order group

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010709247.6A CN111901328B (en) 2020-07-22 2020-07-22 Attribute-based encryption method based on prime order group

Publications (2)

Publication Number Publication Date
CN111901328A true CN111901328A (en) 2020-11-06
CN111901328B CN111901328B (en) 2021-08-06

Family

ID=73190808

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010709247.6A Active CN111901328B (en) 2020-07-22 2020-07-22 Attribute-based encryption method based on prime order group

Country Status (1)

Country Link
CN (1) CN111901328B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189340A (en) * 2021-12-09 2022-03-15 电子科技大学 Attribute-based signature method based on prime order group
CN114567466A (en) * 2022-02-17 2022-05-31 安徽师范大学 CP-ABE strategy hiding-based high-efficiency fine-grained access control method

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104363215A (en) * 2014-11-04 2015-02-18 河海大学 Encryption method and system based on attributes
EP3002904A1 (en) * 2014-10-01 2016-04-06 Thomson Licensing Method for ciphering/deciphering and processing vectors of dimension n, where n is an integer greater or equal to 1
CN106686010A (en) * 2017-03-08 2017-05-17 河南理工大学 Multi-mechanism attribute-based encryption method supporting strategy dynamic updating
CN107181590A (en) * 2017-04-14 2017-09-19 南京邮电大学 Strategy hides the anti-leakage CP ABE methods under being decrypted with outsourcing
CN107241321A (en) * 2017-05-26 2017-10-10 陕西科技大学 A kind of personal medical information method for secret protection
CN107508667A (en) * 2017-07-10 2017-12-22 中国人民解放军信息工程大学 Ciphertext policy ABE base encryption method and its device of the fix duty without key escrow can be disclosed
CN107682353A (en) * 2017-10-25 2018-02-09 西安邮电大学 A kind of health account access control system and method in electron medical treatment cloud
CN109246096A (en) * 2018-08-30 2019-01-18 西安电子科技大学 Multi-functional fine-grained access control method suitable for cloud storage
CN110086615A (en) * 2019-05-06 2019-08-02 福建师范大学 A kind of more authorized party's ciphertext policy ABE base encryption methods of distribution that medium is obscured

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3002904A1 (en) * 2014-10-01 2016-04-06 Thomson Licensing Method for ciphering/deciphering and processing vectors of dimension n, where n is an integer greater or equal to 1
CN104363215A (en) * 2014-11-04 2015-02-18 河海大学 Encryption method and system based on attributes
CN106686010A (en) * 2017-03-08 2017-05-17 河南理工大学 Multi-mechanism attribute-based encryption method supporting strategy dynamic updating
CN107181590A (en) * 2017-04-14 2017-09-19 南京邮电大学 Strategy hides the anti-leakage CP ABE methods under being decrypted with outsourcing
CN107241321A (en) * 2017-05-26 2017-10-10 陕西科技大学 A kind of personal medical information method for secret protection
CN107508667A (en) * 2017-07-10 2017-12-22 中国人民解放军信息工程大学 Ciphertext policy ABE base encryption method and its device of the fix duty without key escrow can be disclosed
CN107682353A (en) * 2017-10-25 2018-02-09 西安邮电大学 A kind of health account access control system and method in electron medical treatment cloud
CN109246096A (en) * 2018-08-30 2019-01-18 西安电子科技大学 Multi-functional fine-grained access control method suitable for cloud storage
CN110086615A (en) * 2019-05-06 2019-08-02 福建师范大学 A kind of more authorized party's ciphertext policy ABE base encryption methods of distribution that medium is obscured

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189340A (en) * 2021-12-09 2022-03-15 电子科技大学 Attribute-based signature method based on prime order group
CN114567466A (en) * 2022-02-17 2022-05-31 安徽师范大学 CP-ABE strategy hiding-based high-efficiency fine-grained access control method

Also Published As

Publication number Publication date
CN111901328B (en) 2021-08-06

Similar Documents

Publication Publication Date Title
Hu et al. Secure and efficient data communication protocol for wireless body area networks
CN108881314B (en) Privacy protection method and system based on CP-ABE ciphertext under fog computing environment
CN104363215B (en) A kind of encryption method and system based on attribute
CN108322447B (en) Data sharing method and system under cloud environment, terminal and cloud server
CN111986755A (en) Data sharing system based on block chain and attribute-based encryption
CN111447192B (en) Lightweight attribute base signcryption method for cloud and mist assisted Internet of things
CN110197081B (en) Cloud data sharing privacy protection method based on block chain
CN106656997B (en) One kind being based on the cross-domain friend-making method for secret protection of mobile social networking proxy re-encryption
CN113761557A (en) Multi-party deep learning privacy protection method based on fully homomorphic encryption algorithm
CN110933033A (en) Cross-domain access control method for multiple Internet of things domains in smart city environment
CN111901328B (en) Attribute-based encryption method based on prime order group
CN111274594B (en) Block chain-based secure big data privacy protection sharing method
CN105897742B (en) Anonymous Identity base access control method applied to electronic health care network
CN113836222B (en) Access control method of concealable strategy and attribute based on block chain
CN105141419B (en) The attribute base endorsement method and system in large attribute domain
CN111431898A (en) Multi-attribute mechanism attribute-based encryption method with search function for cloud-assisted Internet of things
CN111581648B (en) Method of federal learning to preserve privacy in irregular users
Liu et al. Anonymous electronic health record sharing scheme based on decentralized hierarchical attribute-based encryption in cloud environment
CN113411323A (en) Medical record data access control system and method based on attribute encryption
CN110752024A (en) Online medical diagnosis service system based on privacy protection
CN116112244A (en) Access control method based on blockchain and attribute-based encryption
CN113626831A (en) CP-ABE method supporting privacy protection and decryption in cloud
CN105978895A (en) Attribute-based encryption scheme supporting non-monotonic access structure and fine-granularity cancellation
CN116073997A (en) Customizable data access control method, system and computer readable storage medium
CN116055177A (en) Lightweight authentication and key negotiation method suitable for Internet of things equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant