[go: up one dir, main page]

CN106161428A - A kind of ciphertext can the encryption attribute scheme of comparison of equalization - Google Patents

A kind of ciphertext can the encryption attribute scheme of comparison of equalization Download PDF

Info

Publication number
CN106161428A
CN106161428A CN201610405495.5A CN201610405495A CN106161428A CN 106161428 A CN106161428 A CN 106161428A CN 201610405495 A CN201610405495 A CN 201610405495A CN 106161428 A CN106161428 A CN 106161428A
Authority
CN
China
Prior art keywords
ciphertext
manager
attribute
private key
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610405495.5A
Other languages
Chinese (zh)
Other versions
CN106161428B (en
Inventor
廖永建
杨小伟
刘章云
薛荷
洪坤峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201610405495.5A priority Critical patent/CN106161428B/en
Publication of CN106161428A publication Critical patent/CN106161428A/en
Application granted granted Critical
Publication of CN106161428B publication Critical patent/CN106161428B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3026Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to polynomials generation, e.g. generation of irreducible polynomials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Optimization (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开了一种密文可相等比较的属性加密方案,可以实现安全的密文比较。本发明包括:初始化系统安全参数、建立属性全集U,生成主密钥msk,生成公开参数params。密钥生成中心根据用户属性集合S和主密钥msk生成私钥sk发送给用户。数据拥有者先根据params,定义访问控制结构A和相关属性集合及其在控制矩阵上的映射函数ρ,然后生成关键词密文CT1和数据密文CT2并发送给密文管理者。密文管理者可以根据关键词密文CT1比较来存储和提取密文。当用户希望得到关于keywords关键词相关密文时,将keywords的密文形式发送给密文管理者,密文管理者根据比较keywords的密文,来获取相关数据的密文并发送给用户,用户可以根据自己的私钥解密数据密文,获得相应数据。

The invention discloses an attribute encryption scheme in which ciphertexts can be compared equally, which can realize safe ciphertext comparison. The invention includes: initializing system security parameters, establishing attribute complete set U, generating master key msk, and generating public parameters params. The key generation center generates a private key sk according to the user attribute set S and the master key msk and sends it to the user. The data owner first defines the access control structure A and related attribute sets and its mapping function ρ on the control matrix according to params, and then generates keyword ciphertext CT 1 and data ciphertext CT 2 and sends them to the ciphertext manager. The ciphertext manager can store and extract the ciphertext according to the key word ciphertext CT 1 comparison. When the user wants to get the ciphertext related to the keywords, the ciphertext form of the keywords is sent to the ciphertext manager, and the ciphertext manager obtains the ciphertext of the relevant data and sends it to the user according to the ciphertext comparison of the keywords. You can decrypt the data ciphertext according to your own private key to obtain the corresponding data.

Description

一种密文可相等比较的属性加密方案A Attribute Encryption Scheme with Equally Comparable Ciphertexts

技术领域technical field

本发明涉及到密码学,属于云存储管理领域,尤其涉及一种密文具有可比较性的属性加密方案。The invention relates to cryptography and belongs to the field of cloud storage management, in particular to an attribute encryption scheme with comparable ciphertexts.

背景技术Background technique

基于属性的加密方案最早于2005年由Sahai and Waters在《Fuzzy identity-based encryption》一文中提出,基于属性加密是在基于身份加密的基础上发展而来的,后来属性加密被分为基于密文策略的属性加密体制和基于密钥的属性加密体制。基于密文的属性加密体制的访问策略结构由加密者控制,密文和该访问策略结构相关,数据用户的私钥如果满足该访问策略,则可以得到明文。与基于密文策略完全不同的是,基于密钥的属性加密体制则访问策略结构有密钥生成中心控制,并且用户的私钥和该访问策略结构有关,当数据拥有者根据属性集合加密该数据时,当且仅当该属性集合满足与用户私钥相关的控制策略时,用户可以解密得到该数据。由于基于属性加密采用的是一对多的形式(即一个密文可以被多个不同私钥用户解密),因次,属性加密是保证云端数据安全的一种非常重要的手段。属性加密的私钥管理同身份加密相同,需要私钥中心管理公钥和私钥。The attribute-based encryption scheme was first proposed by Sahai and Waters in the article "Fuzzy identity-based encryption" in 2005. Attribute-based encryption was developed on the basis of identity-based encryption. Later, attribute-based encryption was divided into ciphertext-based Policy-based attribute encryption system and key-based attribute encryption system. The access strategy structure of the ciphertext-based attribute encryption system is controlled by the encryptor, and the ciphertext is related to the access strategy structure. If the private key of the data user satisfies the access strategy, the plaintext can be obtained. Completely different from the ciphertext-based policy, in the key-based attribute encryption system, the access policy structure is controlled by the key generation center, and the user's private key is related to the access policy structure. When the data owner encrypts the data according to the attribute set , the user can decrypt the data if and only if the attribute set satisfies the control policy related to the user's private key. Since attribute-based encryption adopts a one-to-many form (that is, one ciphertext can be decrypted by multiple users with different private keys), attribute-based encryption is a very important means to ensure cloud data security. The private key management of attribute encryption is the same as that of identity encryption, requiring the private key center to manage public and private keys.

属性加密主要包括系统建立,私钥生成,加密和解密四个过程。属性加密常用来解决云服务中的数据安全保障,但属性加密的数据都是密文的形式存储在云端,所有这为云服务商管理数据的存储结构带来很大的不便。Guomin Yang结合公钥加密体制和基于关键词搜索的加密体制,提出了基于密文比较的公钥加密体制(PKEET),该体制有一个叫Test功能的函数,该函数可以检测任何两个密文是否是同一个数据加密的结果,并且构造基于关键词搜索的加密方案。云服务商可以根据关键词的密文比较来组织和管理数据的密文。用户可以加密关键词并发送给云服务提供商,云服务商可以根据关键词的密文比较结果来提取数据,并且将密文的数据发送给用户,如果用户有密文的私钥,则可以得到相应的答案。由于PKEET的密文可以任何人做比较,Q.Tang提出了基于细粒度的基于授权机制的PKEET,该方案只有授权的用户才可以用Test功能。由于公钥加密体制的公私钥管理的复杂性,MaS.提出了基于身份的密文可比较方案(IDEET),该方案利用了基于身份加密体制的公私钥管理的方便性。Attribute encryption mainly includes four processes of system establishment, private key generation, encryption and decryption. Attribute encryption is often used to solve data security in cloud services, but attribute-encrypted data is stored in the cloud in the form of ciphertext, which brings great inconvenience to cloud service providers to manage data storage structures. Combining the public key encryption system and the encryption system based on keyword search, Guomin Yang proposed a public key encryption system based on ciphertext comparison (PKEET), which has a function called Test function, which can detect any two ciphertexts Whether it is the result of the same data encryption, and construct an encryption scheme based on keyword search. Cloud service providers can organize and manage data ciphertexts based on keyword ciphertext comparisons. The user can encrypt the keyword and send it to the cloud service provider. The cloud service provider can extract the data according to the ciphertext comparison result of the keyword and send the ciphertext data to the user. If the user has the private key of the ciphertext, he can get the corresponding answer. Since the ciphertext of PKEET can be compared by anyone, Q.Tang proposed PKEET based on the fine-grained authorization mechanism. In this scheme, only authorized users can use the Test function. Due to the complexity of public-private key management in public-key encryption systems, MaS. proposed an identity-based ciphertext comparable scheme (IDEET), which takes advantage of the convenience of public-private key management in identity-based encryption systems.

由于传统的公钥加密体制以及基于身份的加密体制都是属于一对一的加密体制,属性加密是数据拥有者通过一份访问策略来加密一份数据,该被加密的数据可以被多个属性满足访问策略的用户来解密。因此,属性加密更适合于云存储的场景。我们结合基于属性加密体制和以上可比较密文加密体制的基础上,提出了一种密文可相等比较的属性加密体制,并在该体制上给出了一个具体的方案。基于属性的密文具有相等比较性的加密体制是属于一对多的加密方案,即一份密文可以被多个人解密。并且,云服务提供商可以利用Test功能来存储和提取密文,Test功能为云服务商管理密文提供了很大的方便性。因此,本方案更适合云服务等场景。Since the traditional public key encryption system and the identity-based encryption system are all one-to-one encryption systems, attribute encryption means that the data owner encrypts a piece of data through an access policy, and the encrypted data can be encrypted by multiple attributes. Users who meet the access policy to decrypt. Therefore, attribute encryption is more suitable for cloud storage scenarios. On the basis of the attribute-based encryption system and the above-mentioned comparable ciphertext encryption system, we propose an attribute-based encryption system in which ciphertexts can be equal and comparable, and give a specific scheme on this system. Attribute-based ciphertexts with equal comparisons are one-to-many encryption schemes, that is, one ciphertext can be decrypted by multiple people. Moreover, the cloud service provider can use the Test function to store and extract the ciphertext, and the Test function provides great convenience for the cloud service provider to manage the ciphertext. Therefore, this solution is more suitable for scenarios such as cloud services.

发明内容Contents of the invention

本发明的目的在于:提出基于密文可相等比较的属性加密概念并且实现一种方案,并且该方案能够保证密文管理者可以比较任何两个密文是否是同一数据的加密结果,但该密文管理者不能够解密。The purpose of the present invention is to propose an attribute encryption concept based on ciphertexts that can be compared equally and realize a scheme, and this scheme can ensure that the ciphertext manager can compare whether any two ciphertexts are the encryption results of the same data, but the ciphertext The file manager cannot decrypt it.

本发明公开了一种密文可相等比较的属性加密方案,其主要步骤包括:The invention discloses an attribute encryption scheme in which ciphertexts can be compared equally. The main steps include:

系统初始化:输入系统安全参数λ和属性集合U,输出公共参数params和主密钥msk。System initialization: input system security parameter λ and attribute set U, output public parameter params and master key msk.

提取私钥:输入主密钥和某用户的属性结合S,输出该用户的私钥sk。Extract the private key: input the master key and a user's attribute combination S, and output the user's private key sk.

加密:输入公共参数params,消息M和访问控制结构A,输出密文CT。Encryption: Input public parameters params, message M and access control structure A, and output ciphertext CT.

解密:输入密文CT和私钥sk,输出消息M。Decryption: Input the ciphertext CT and the private key sk, and output the message M.

比较:输入两个密文CT1,CT2。如果CT1和CT2是相同的消息加密的结果,则输出True,否则输出False。Comparison: Input two ciphertexts CT 1 , CT 2 . If CT 1 and CT 2 are the result of the same message encryption, output True, otherwise output False.

由于采用了以上所述技术方案,本发明的有益效果在于:Owing to adopting above-mentioned technical scheme, the beneficial effect of the present invention is:

(1)密文管理者可以根据密文的可比较性,来组织管理密文。比较传统的加密方案,密文可以有组织地存储在服务器。(1) The ciphertext manager can organize and manage ciphertexts according to the comparability of ciphertexts. Compared with traditional encryption schemes, the ciphertext can be stored in the server in an organized manner.

(2)灵活性:该方案的是基于密文策略的属性加密方案,访问控制结构中的属性可以进行“与”和“或”运算,以到达用户拥有者可以灵巧的控制解密者。(2) Flexibility: This scheme is an attribute encryption scheme based on ciphertext strategy. The attributes in the access control structure can be "ANDed" and "ORed", so that the user owner can flexibly control the decryptor.

(3)密文管理者拥有比较密文的权限,但不能够恢复出明文。因此,在密文管理者在有效管理数据的前提下,又保证了数据的安全性。(3) The administrator of the ciphertext has the authority to compare the ciphertext, but cannot recover the plaintext. Therefore, on the premise that the ciphertext manager effectively manages the data, the security of the data is guaranteed.

(4)减少了公钥管理和验证开销:本方案为基于属性的加密体制,因此不需要证书管理机构CA对公钥证书进行管理,也不需要用户对公钥进行认证。(4) Reduced public key management and verification overhead: this scheme is an attribute-based encryption system, so it does not require the certificate management agency CA to manage the public key certificate, nor does it require the user to authenticate the public key.

附图说明Description of drawings

本发明将通过具体实例及附图的方式说明,其中:The present invention will be illustrated by way of specific examples and accompanying drawings, wherein:

图1为本发明具体实施的加密操作流程图;Fig. 1 is the encryption operation flowchart of the embodiment of the present invention;

图2为本发明具体实施的解密操作流程图;Fig. 2 is the decryption operation flowchart of the embodiment of the present invention;

图3是本发明的实施实例1的系统结构示意图。Fig. 3 is a schematic diagram of the system structure of Embodiment 1 of the present invention.

具体实施方式detailed description

为使本发明的方案技术和应用性更加清楚,下面结合具体实施实例和附图,对本发明作更详细的描述。In order to make the solution technology and applicability of the present invention clearer, the present invention will be described in more detail below in conjunction with specific implementation examples and accompanying drawings.

实施实例1Implementation example 1

参见图3,具体执行步骤包括私钥生成中心设定系统安全参数、密钥空间、消息空间、公开参数,生成属性集合中的公钥,具体描述如下:Referring to Figure 3, the specific execution steps include setting the system security parameters, key space, message space, and public parameters by the private key generation center, and generating the public key in the attribute set. The specific description is as follows:

(1)系统初始化(1) System initialization

(1.1)设系统安全参数为λ,p为大素数,G1表示阶为p的循环加法群,g∈G1表示G1的生成元,G2表示阶为p的循环乘法群。e表示双线性映射G1×G1→G2。定义一个安全的Hash函数H,H表示从G2映射到G1的安全哈希函数,代表用户属性的U个元素h1,h2,...,hu∈G1。用户私钥密钥空间为K∈G1,加密消息空间为G1表示有限域Zp={0,1,...,p-1}去掉零元素所得到的集合。(1.1) Suppose the system security parameter is λ, p is a large prime number, G 1 represents the cyclic additive group of order p, g∈G 1 represents the generator of G 1 , and G 2 represents the cyclic multiplicative group of order p. e represents a bilinear map G 1 ×G 1 →G 2 . Define a secure Hash function H, H represents the secure hash function mapped from G 2 to G 1 , representing U elements h 1 , h 2 ,...,hu ∈ G 1 of user attributes. The user private key key space is K∈G 1 , and the encrypted message space is G 1 . Represents the set obtained by removing zero elements from the finite field Z p ={0,1,...,p-1}.

(1.2)私钥生成中心随机选取计算并得到公钥为ppub=(e(g,g)α,ga);主密钥为:msk=gα(1.2) The private key generation center is randomly selected Calculate and obtain the public key as p pub =(e(g,g) α ,g a ); the master key as: msk=g α .

基于上述设定,得到的公开参数为:params=(G1,G2,p,g,e,H,ppub,U)。Based on the above settings, the obtained public parameters are: params=(G 1 , G 2 , p, g, e, H, p pub , U).

(1.3)私钥生成中心将公开参数params。(1.3) The private key generation center will publicize the parameter params.

(2)提取私钥(2) Extract the private key

(2.1)私钥生成中心得到用户属性信息集合S。(2.1) The private key generation center obtains the user attribute information set S.

(2.2)私钥生成中心随机选取并且根据主密钥msk和用户属性集合S计算 (2.2) The private key generation center is randomly selected And calculate according to master key msk and user attribute set S

(2.3)私钥生成中心将sk发送给属性集合为S的单个用户(若多个用户,随机选取多个t,产生不同的sk分别发送给不同的用户)。(2.3) The private key generation center sends sk to a single user whose attribute set is S (if there are multiple users, randomly select multiple t, generate different sk and send them to different users).

(3)加密(3) encryption

数据拥有者可以根据params,生成访问控制结构(Al×n,ρ),{ρ:ρ(i)∈G1,i∈{1,2...l}}代表矩阵第i行到属性空间的映射,并随机选取向量和计算然后随机选取r1,r2...rl∈Zp和计算密文CT:The data owner can generate an access control structure (A l×n ,ρ) according to the params, {ρ:ρ(i)∈G 1 ,i∈{1,2...l}} represents the i-th row of the matrix to the attribute space, and randomly select vectors and calculate Then randomly select r 1 ,r 2 ...r l ∈ Z p and calculate the ciphertext CT:

Cs=gs,Ct=Ms,C=MH(e(g,g)αs), C s =g s , C t =M s , C=MH(e(g,g) αs ),

然后将(CT,Al×n,ρ)发送给密文管理者。Then send (CT,A l×n ,ρ) to the ciphertext manager.

(4)解密(4) Decryption

(4.1)假设数据用户的属性集为S,则数据拥有者从私钥生成中心得到私钥sk,从密文管理者得到(CT,Al×n,ρ),定义且I={i:ρ(i)∈S}。(4.1) Assuming that the attribute set of the data user is S, the data owner obtains the private key sk from the private key generation center, and obtains (CT,A l×n ,ρ) from the ciphertext manager. Define And I={i:ρ(i)∈S}.

(4.2)如果S满足(Al×n,ρ),则根据可在多项式时间内计算出{ωi∈Zp}i∈I(4.2) If S satisfies (A l×n ,ρ), then according to i ∈ Z p } i∈I can be calculated in polynomial time.

(4.3)根据以上可以计算然后可以得到明文M=C/H(e(g,g)αs)。(4.3) According to the above, it can be calculated Then the plaintext M=C/H(e(g,g) αs ) can be obtained.

(5)比较(5) compare

(5.1)密文管理者输入给Test算法两个比较密文CT1、CT2(5.1) The ciphertext manager inputs two comparison ciphertexts CT 1 and CT 2 to the Test algorithm.

(5.2)Test算法计算如果两者相等,返回给密文管理者True,密文管理者则判定CT1和CT2是相同明文加密的密文。否则返回False,密文管理者可以判断CT1和CT2是不同明文加密的密文。(5.2) Test algorithm calculation and If the two are equal, return True to the ciphertext manager, and the ciphertext manager determines that CT 1 and CT 2 are ciphertexts encrypted with the same plaintext. Otherwise, it returns False, and the ciphertext manager can judge that CT 1 and CT 2 are ciphertexts encrypted with different plaintexts.

以上所述,仅为本发明的具体实施方式,本说明书(包括附加权利要求、摘要和附图)中所公开的任一特征,除非特别叙述,均可被其他等效或具有类似目的的替代特征加以替换,即除非特别叙述,每个特征只是一系列等效或类似特征中的一个例子。本发明可以扩展到任何在本说明书中披露的新特征或任何新的组合,以及披露的任一新的方法或过程的步骤或任何新的组合。The above is only a specific embodiment of the present invention. Any feature disclosed in this specification (including appended claims, abstract and drawings), unless specifically stated, can be replaced by other equivalent or similar purposes. Each feature is one example only of a series of equivalent or similar features, unless expressly stated otherwise. The present invention may extend to any new features or any new combination disclosed in this specification, as well as the steps of any new method or process or any new combination disclosed.

Claims (5)

1. a ciphertext can the encryption attribute scheme of comparison of equalization, it is characterised in that comprise the following steps:
System initialization: setting security of system parameter as λ, p is Big prime, G1Represent the circled addition group that rank are p, g ∈ G1Represent G1 Generation unit, G2Represent the circulation multiplicative group that rank are p.E represents bilinear map G1×G1→G2.The Hash of one safety of definition Function H, H represent from G2It is mapped to G1Secure hash function, represent U element h of user property1,h2...hu∈G1.User Private key space is K ∈ G1, encryption message space is G1Represent finite field Zp=0,1 ..., p-1} removes neutral element institute The set obtained.Private key generates center and randomly selectsCalculating and obtaining PKI is ppub=(e (g, g)α,ga);Main close Key is: msk=gα.Based on above-mentioned setting, the open parameter obtained is: params=(G1,G2,p,g,e,H,ppub,U)。
Extract private key: the attribute of input master key and certain user combines S, exports the private key sk of this user.Private key generates center and selects at random TakeAnd calculate according to master key msk and user property set S
Encryption: input common parameter params, message M and access control structure A, export ciphertext CT.Data owner can root According to params, generate and access control structure (Al×n, ρ), { ρ: ρ (i) ∈ G1, { 1,2...l}} represents matrix the i-th row to attribute to i ∈ The mapping in space, and randomly select vectorAnd calculatingThe most random Choose r1,r2...rl∈ZpWith calculate ciphertext CT:
Cs=gs,Ct=Ms, C=MH (e (g, g)αs),
Then by (CT, Al×n, ρ) and it is sent to ciphertext manager.
Deciphering: input ciphertext CT and private key sk, output message M.The property set assuming data user is S, then data owner from Private key generates center and obtains private key sk, and from ciphertext, manager obtains (CT, Al×n, ρ), definitionAnd I={i: ρ (i) ∈S}.If S meets (Al×n, ρ), then basis{ ω can be calculated in polynomial timei∈Zp }i∈I
According to calculating aboveThen can obtain in plain text M=C/H (e (g, g)αs)。
Relatively: input two ciphertexts CT1, CT2.Test algorithm calculatesWithIf both are equal, return To ciphertext manager True, ciphertext manager then judges CT1And CT2It it is the ciphertext of identical plain text encryption.Otherwise return False, close Literary composition manager may determine that CT1And CT2It it is the ciphertext of different plain text encryption.
2. the method for claim 1, it is characterised in that this AES, compared to other encryption attribute algorithms, adds Comparing function, the i.e. ciphertext of this encryption attribute algorithm have comparability, add the gerentocratic function of cloud storage.
3. the method such as claim 1, described in 2, it is characterised in that this AES provides cloud storage manager to be had and compare The function of ciphertext, manager can utilize this function not knowing to store and extract in the case of in plain text ciphertext, but this manager Can not recover from ciphertext in plain text.
4. the method for claim 1, it is characterised in that this AES make use of Bilinear map to carry out structure at encrypting stage Making the function of comparable ciphertext, be simultaneously introduced a secure hash function H, H represents from G2It is mapped to G1Secure Hash letter Number.
5. the method for claim 1, it is characterised in that this AES also utilizes secure Hash letter at decryption phase Number H, to ensure that plaintext space is at G1In.
CN201610405495.5A 2016-06-08 2016-06-08 A kind of ciphertext can comparison of equalization encryption attribute method Expired - Fee Related CN106161428B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610405495.5A CN106161428B (en) 2016-06-08 2016-06-08 A kind of ciphertext can comparison of equalization encryption attribute method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610405495.5A CN106161428B (en) 2016-06-08 2016-06-08 A kind of ciphertext can comparison of equalization encryption attribute method

Publications (2)

Publication Number Publication Date
CN106161428A true CN106161428A (en) 2016-11-23
CN106161428B CN106161428B (en) 2019-07-05

Family

ID=57352885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610405495.5A Expired - Fee Related CN106161428B (en) 2016-06-08 2016-06-08 A kind of ciphertext can comparison of equalization encryption attribute method

Country Status (1)

Country Link
CN (1) CN106161428B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106549753A (en) * 2016-10-18 2017-03-29 电子科技大学 The encipherment scheme that a kind of support ciphertext of identity-based compares
CN108880796A (en) * 2018-06-25 2018-11-23 电子科技大学 It is a kind of for server efficiently based on the outsourcing decryption method of encryption attribute algorithm
CN109889332A (en) * 2019-01-21 2019-06-14 电子科技大学 Certificate-Based Equality Testing Encryption Method
CN109902501A (en) * 2019-03-19 2019-06-18 中国海洋大学 A structured encryption method and system for equality testing based on cloud service platform
CN110401667A (en) * 2019-07-31 2019-11-01 杭州项帮科技有限公司 A kind of encryption attribute method of the fraction key mechanism based on the mapping of entry type
CN110912897A (en) * 2019-11-27 2020-03-24 郑州轻工业大学 A book resource access control method based on ciphertext attribute authentication and threshold function
CN110943825A (en) * 2019-12-12 2020-03-31 高胜法 Perfect safety block cipher
CN113452706A (en) * 2021-06-28 2021-09-28 长沙学院 Attribute encryption method and system supporting numerical attribute comparison access strategy
CN113992397A (en) * 2021-10-26 2022-01-28 电子科技大学 An Efficient Public Key Encryption Method Supporting Differential Equality Testing
CN114756011A (en) * 2022-05-27 2022-07-15 西安电子科技大学 Intelligent home abnormity detection method based on TV-PKEET
CN116055058A (en) * 2023-01-12 2023-05-02 北京邮电大学 Privacy protection method for online car-hailing based on third-party operation privacy set intersection technology

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7634085B1 (en) * 2005-03-25 2009-12-15 Voltage Security, Inc. Identity-based-encryption system with partial attribute matching
CN101944168A (en) * 2009-07-09 2011-01-12 精品科技股份有限公司 Electronic file authority control and management system
CN102546764A (en) * 2011-12-20 2012-07-04 华中科技大学 Safe access method of cloud storage system
US20120314854A1 (en) * 2011-06-10 2012-12-13 Zeutro, Llc System, Apparatus and Method for Decentralizing Attribute-Based Encryption Information
US20140289513A1 (en) * 2013-03-15 2014-09-25 Arizona Board Of Regents On Behalf Of Arizona State University Enabling Comparable Data Access Control for Lightweight Mobile Devices in Clouds

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7634085B1 (en) * 2005-03-25 2009-12-15 Voltage Security, Inc. Identity-based-encryption system with partial attribute matching
CN101944168A (en) * 2009-07-09 2011-01-12 精品科技股份有限公司 Electronic file authority control and management system
US20120314854A1 (en) * 2011-06-10 2012-12-13 Zeutro, Llc System, Apparatus and Method for Decentralizing Attribute-Based Encryption Information
CN102546764A (en) * 2011-12-20 2012-07-04 华中科技大学 Safe access method of cloud storage system
US20140289513A1 (en) * 2013-03-15 2014-09-25 Arizona Board Of Regents On Behalf Of Arizona State University Enabling Comparable Data Access Control for Lightweight Mobile Devices in Clouds

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106549753A (en) * 2016-10-18 2017-03-29 电子科技大学 The encipherment scheme that a kind of support ciphertext of identity-based compares
CN108880796B (en) * 2018-06-25 2021-04-27 电子科技大学 Efficient outsourcing decryption method for server based on attribute encryption algorithm
CN108880796A (en) * 2018-06-25 2018-11-23 电子科技大学 It is a kind of for server efficiently based on the outsourcing decryption method of encryption attribute algorithm
CN109889332A (en) * 2019-01-21 2019-06-14 电子科技大学 Certificate-Based Equality Testing Encryption Method
CN109902501A (en) * 2019-03-19 2019-06-18 中国海洋大学 A structured encryption method and system for equality testing based on cloud service platform
CN109902501B (en) * 2019-03-19 2021-09-17 中国海洋大学 Structured encryption method and system for carrying out equivalence test based on cloud service platform
CN110401667B (en) * 2019-07-31 2021-08-06 杭州项帮科技有限公司 Attribute encryption method of multi-item mapping-based distributed key mechanism
CN110401667A (en) * 2019-07-31 2019-11-01 杭州项帮科技有限公司 A kind of encryption attribute method of the fraction key mechanism based on the mapping of entry type
CN110912897A (en) * 2019-11-27 2020-03-24 郑州轻工业大学 A book resource access control method based on ciphertext attribute authentication and threshold function
CN110912897B (en) * 2019-11-27 2021-11-30 郑州轻工业大学 Book resource access control method based on ciphertext attribute authentication and threshold function
CN110943825A (en) * 2019-12-12 2020-03-31 高胜法 Perfect safety block cipher
CN110943825B (en) * 2019-12-12 2023-05-02 高胜法 Perfect security block cipher
CN113452706A (en) * 2021-06-28 2021-09-28 长沙学院 Attribute encryption method and system supporting numerical attribute comparison access strategy
CN113452706B (en) * 2021-06-28 2022-05-03 长沙学院 Attribute encryption method and system supporting numerical attribute comparison access strategy
CN113992397A (en) * 2021-10-26 2022-01-28 电子科技大学 An Efficient Public Key Encryption Method Supporting Differential Equality Testing
CN114756011A (en) * 2022-05-27 2022-07-15 西安电子科技大学 Intelligent home abnormity detection method based on TV-PKEET
CN116055058A (en) * 2023-01-12 2023-05-02 北京邮电大学 Privacy protection method for online car-hailing based on third-party operation privacy set intersection technology

Also Published As

Publication number Publication date
CN106161428B (en) 2019-07-05

Similar Documents

Publication Publication Date Title
CN106161428B (en) A kind of ciphertext can comparison of equalization encryption attribute method
Li et al. Full verifiability for outsourced decryption in attribute based encryption
CN109246096B (en) A Versatile Fine-Grained Access Control Approach for Cloud Storage
Li et al. TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage
CN104113408B (en) It is a kind of realize the revocation of timely user property based on ciphertext policy ABE encryption method
CN106375346B (en) A data protection method based on conditional broadcast proxy re-encryption in cloud environment
CN103401839B (en) A kind of many authorization center encryption method based on attribute protection
CN109246098B (en) A Method for Supporting Synchronous Ciphertext Comparison of Backup Servers
CN106549753B (en) A kind of encryption method that the support ciphertext of identity-based compares
CN105933345B (en) A Verifiable Outsourcing Attribute-Based Encryption Method Based on Linear Secret Sharing
CN106789044B (en) Searchable encryption method for cipher text data public key stored in cloud on grid under standard model
CN110933033B (en) Cross-domain access control method for multiple IoT domains in smart city environment
CN107154845B (en) An Attribute-Based Outsourcing Scheme for BGN-Type Ciphertext Decryption
CN104320393B (en) The controllable efficient attribute base proxy re-encryption method of re-encryption
CN105763528B (en) The encryption device of diversity person's anonymity under a kind of mixed mechanism
WO2021190452A1 (en) Lightweight attribute-based signcryption method for cloud and fog-assisted internet of things
WO2016112734A1 (en) Group encryption and decryption method and system having selection and exclusion functions
CN108880796A (en) It is a kind of for server efficiently based on the outsourcing decryption method of encryption attribute algorithm
Wang et al. A pre-authentication approach to proxy re-encryption in big data context
CN113794561A (en) Public key searchable encryption method and system
CN109981265A (en) A kind of ciphertext equivalence determination method without using Bilinear map of identity-based
CN106878322A (en) An Encryption and Decryption Method Based on Attribute-Based Fixed-length Ciphertext and Key
CN105025021B (en) Principal disjunctive normal form access strategy based on encryption attribute method on lattice
Lv et al. A secure and efficient revocation scheme for fine-grained access control in cloud storage.
CN111966802A (en) Attribute-based encryption method and system supporting keyword Boolean search

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190705

CF01 Termination of patent right due to non-payment of annual fee