CN106161428A - A kind of ciphertext can the encryption attribute scheme of comparison of equalization - Google Patents
A kind of ciphertext can the encryption attribute scheme of comparison of equalization Download PDFInfo
- Publication number
- CN106161428A CN106161428A CN201610405495.5A CN201610405495A CN106161428A CN 106161428 A CN106161428 A CN 106161428A CN 201610405495 A CN201610405495 A CN 201610405495A CN 106161428 A CN106161428 A CN 106161428A
- Authority
- CN
- China
- Prior art keywords
- ciphertext
- manager
- attribute
- private key
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3026—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to polynomials generation, e.g. generation of irreducible polynomials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Pure & Applied Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Mathematical Optimization (AREA)
- Storage Device Security (AREA)
Abstract
本发明公开了一种密文可相等比较的属性加密方案,可以实现安全的密文比较。本发明包括:初始化系统安全参数、建立属性全集U,生成主密钥msk,生成公开参数params。密钥生成中心根据用户属性集合S和主密钥msk生成私钥sk发送给用户。数据拥有者先根据params,定义访问控制结构A和相关属性集合及其在控制矩阵上的映射函数ρ,然后生成关键词密文CT1和数据密文CT2并发送给密文管理者。密文管理者可以根据关键词密文CT1比较来存储和提取密文。当用户希望得到关于keywords关键词相关密文时,将keywords的密文形式发送给密文管理者,密文管理者根据比较keywords的密文,来获取相关数据的密文并发送给用户,用户可以根据自己的私钥解密数据密文,获得相应数据。
The invention discloses an attribute encryption scheme in which ciphertexts can be compared equally, which can realize safe ciphertext comparison. The invention includes: initializing system security parameters, establishing attribute complete set U, generating master key msk, and generating public parameters params. The key generation center generates a private key sk according to the user attribute set S and the master key msk and sends it to the user. The data owner first defines the access control structure A and related attribute sets and its mapping function ρ on the control matrix according to params, and then generates keyword ciphertext CT 1 and data ciphertext CT 2 and sends them to the ciphertext manager. The ciphertext manager can store and extract the ciphertext according to the key word ciphertext CT 1 comparison. When the user wants to get the ciphertext related to the keywords, the ciphertext form of the keywords is sent to the ciphertext manager, and the ciphertext manager obtains the ciphertext of the relevant data and sends it to the user according to the ciphertext comparison of the keywords. You can decrypt the data ciphertext according to your own private key to obtain the corresponding data.
Description
技术领域technical field
本发明涉及到密码学,属于云存储管理领域,尤其涉及一种密文具有可比较性的属性加密方案。The invention relates to cryptography and belongs to the field of cloud storage management, in particular to an attribute encryption scheme with comparable ciphertexts.
背景技术Background technique
基于属性的加密方案最早于2005年由Sahai and Waters在《Fuzzy identity-based encryption》一文中提出,基于属性加密是在基于身份加密的基础上发展而来的,后来属性加密被分为基于密文策略的属性加密体制和基于密钥的属性加密体制。基于密文的属性加密体制的访问策略结构由加密者控制,密文和该访问策略结构相关,数据用户的私钥如果满足该访问策略,则可以得到明文。与基于密文策略完全不同的是,基于密钥的属性加密体制则访问策略结构有密钥生成中心控制,并且用户的私钥和该访问策略结构有关,当数据拥有者根据属性集合加密该数据时,当且仅当该属性集合满足与用户私钥相关的控制策略时,用户可以解密得到该数据。由于基于属性加密采用的是一对多的形式(即一个密文可以被多个不同私钥用户解密),因次,属性加密是保证云端数据安全的一种非常重要的手段。属性加密的私钥管理同身份加密相同,需要私钥中心管理公钥和私钥。The attribute-based encryption scheme was first proposed by Sahai and Waters in the article "Fuzzy identity-based encryption" in 2005. Attribute-based encryption was developed on the basis of identity-based encryption. Later, attribute-based encryption was divided into ciphertext-based Policy-based attribute encryption system and key-based attribute encryption system. The access strategy structure of the ciphertext-based attribute encryption system is controlled by the encryptor, and the ciphertext is related to the access strategy structure. If the private key of the data user satisfies the access strategy, the plaintext can be obtained. Completely different from the ciphertext-based policy, in the key-based attribute encryption system, the access policy structure is controlled by the key generation center, and the user's private key is related to the access policy structure. When the data owner encrypts the data according to the attribute set , the user can decrypt the data if and only if the attribute set satisfies the control policy related to the user's private key. Since attribute-based encryption adopts a one-to-many form (that is, one ciphertext can be decrypted by multiple users with different private keys), attribute-based encryption is a very important means to ensure cloud data security. The private key management of attribute encryption is the same as that of identity encryption, requiring the private key center to manage public and private keys.
属性加密主要包括系统建立,私钥生成,加密和解密四个过程。属性加密常用来解决云服务中的数据安全保障,但属性加密的数据都是密文的形式存储在云端,所有这为云服务商管理数据的存储结构带来很大的不便。Guomin Yang结合公钥加密体制和基于关键词搜索的加密体制,提出了基于密文比较的公钥加密体制(PKEET),该体制有一个叫Test功能的函数,该函数可以检测任何两个密文是否是同一个数据加密的结果,并且构造基于关键词搜索的加密方案。云服务商可以根据关键词的密文比较来组织和管理数据的密文。用户可以加密关键词并发送给云服务提供商,云服务商可以根据关键词的密文比较结果来提取数据,并且将密文的数据发送给用户,如果用户有密文的私钥,则可以得到相应的答案。由于PKEET的密文可以任何人做比较,Q.Tang提出了基于细粒度的基于授权机制的PKEET,该方案只有授权的用户才可以用Test功能。由于公钥加密体制的公私钥管理的复杂性,MaS.提出了基于身份的密文可比较方案(IDEET),该方案利用了基于身份加密体制的公私钥管理的方便性。Attribute encryption mainly includes four processes of system establishment, private key generation, encryption and decryption. Attribute encryption is often used to solve data security in cloud services, but attribute-encrypted data is stored in the cloud in the form of ciphertext, which brings great inconvenience to cloud service providers to manage data storage structures. Combining the public key encryption system and the encryption system based on keyword search, Guomin Yang proposed a public key encryption system based on ciphertext comparison (PKEET), which has a function called Test function, which can detect any two ciphertexts Whether it is the result of the same data encryption, and construct an encryption scheme based on keyword search. Cloud service providers can organize and manage data ciphertexts based on keyword ciphertext comparisons. The user can encrypt the keyword and send it to the cloud service provider. The cloud service provider can extract the data according to the ciphertext comparison result of the keyword and send the ciphertext data to the user. If the user has the private key of the ciphertext, he can get the corresponding answer. Since the ciphertext of PKEET can be compared by anyone, Q.Tang proposed PKEET based on the fine-grained authorization mechanism. In this scheme, only authorized users can use the Test function. Due to the complexity of public-private key management in public-key encryption systems, MaS. proposed an identity-based ciphertext comparable scheme (IDEET), which takes advantage of the convenience of public-private key management in identity-based encryption systems.
由于传统的公钥加密体制以及基于身份的加密体制都是属于一对一的加密体制,属性加密是数据拥有者通过一份访问策略来加密一份数据,该被加密的数据可以被多个属性满足访问策略的用户来解密。因此,属性加密更适合于云存储的场景。我们结合基于属性加密体制和以上可比较密文加密体制的基础上,提出了一种密文可相等比较的属性加密体制,并在该体制上给出了一个具体的方案。基于属性的密文具有相等比较性的加密体制是属于一对多的加密方案,即一份密文可以被多个人解密。并且,云服务提供商可以利用Test功能来存储和提取密文,Test功能为云服务商管理密文提供了很大的方便性。因此,本方案更适合云服务等场景。Since the traditional public key encryption system and the identity-based encryption system are all one-to-one encryption systems, attribute encryption means that the data owner encrypts a piece of data through an access policy, and the encrypted data can be encrypted by multiple attributes. Users who meet the access policy to decrypt. Therefore, attribute encryption is more suitable for cloud storage scenarios. On the basis of the attribute-based encryption system and the above-mentioned comparable ciphertext encryption system, we propose an attribute-based encryption system in which ciphertexts can be equal and comparable, and give a specific scheme on this system. Attribute-based ciphertexts with equal comparisons are one-to-many encryption schemes, that is, one ciphertext can be decrypted by multiple people. Moreover, the cloud service provider can use the Test function to store and extract the ciphertext, and the Test function provides great convenience for the cloud service provider to manage the ciphertext. Therefore, this solution is more suitable for scenarios such as cloud services.
发明内容Contents of the invention
本发明的目的在于:提出基于密文可相等比较的属性加密概念并且实现一种方案,并且该方案能够保证密文管理者可以比较任何两个密文是否是同一数据的加密结果,但该密文管理者不能够解密。The purpose of the present invention is to propose an attribute encryption concept based on ciphertexts that can be compared equally and realize a scheme, and this scheme can ensure that the ciphertext manager can compare whether any two ciphertexts are the encryption results of the same data, but the ciphertext The file manager cannot decrypt it.
本发明公开了一种密文可相等比较的属性加密方案,其主要步骤包括:The invention discloses an attribute encryption scheme in which ciphertexts can be compared equally. The main steps include:
系统初始化:输入系统安全参数λ和属性集合U,输出公共参数params和主密钥msk。System initialization: input system security parameter λ and attribute set U, output public parameter params and master key msk.
提取私钥:输入主密钥和某用户的属性结合S,输出该用户的私钥sk。Extract the private key: input the master key and a user's attribute combination S, and output the user's private key sk.
加密:输入公共参数params,消息M和访问控制结构A,输出密文CT。Encryption: Input public parameters params, message M and access control structure A, and output ciphertext CT.
解密:输入密文CT和私钥sk,输出消息M。Decryption: Input the ciphertext CT and the private key sk, and output the message M.
比较:输入两个密文CT1,CT2。如果CT1和CT2是相同的消息加密的结果,则输出True,否则输出False。Comparison: Input two ciphertexts CT 1 , CT 2 . If CT 1 and CT 2 are the result of the same message encryption, output True, otherwise output False.
由于采用了以上所述技术方案,本发明的有益效果在于:Owing to adopting above-mentioned technical scheme, the beneficial effect of the present invention is:
(1)密文管理者可以根据密文的可比较性,来组织管理密文。比较传统的加密方案,密文可以有组织地存储在服务器。(1) The ciphertext manager can organize and manage ciphertexts according to the comparability of ciphertexts. Compared with traditional encryption schemes, the ciphertext can be stored in the server in an organized manner.
(2)灵活性:该方案的是基于密文策略的属性加密方案,访问控制结构中的属性可以进行“与”和“或”运算,以到达用户拥有者可以灵巧的控制解密者。(2) Flexibility: This scheme is an attribute encryption scheme based on ciphertext strategy. The attributes in the access control structure can be "ANDed" and "ORed", so that the user owner can flexibly control the decryptor.
(3)密文管理者拥有比较密文的权限,但不能够恢复出明文。因此,在密文管理者在有效管理数据的前提下,又保证了数据的安全性。(3) The administrator of the ciphertext has the authority to compare the ciphertext, but cannot recover the plaintext. Therefore, on the premise that the ciphertext manager effectively manages the data, the security of the data is guaranteed.
(4)减少了公钥管理和验证开销:本方案为基于属性的加密体制,因此不需要证书管理机构CA对公钥证书进行管理,也不需要用户对公钥进行认证。(4) Reduced public key management and verification overhead: this scheme is an attribute-based encryption system, so it does not require the certificate management agency CA to manage the public key certificate, nor does it require the user to authenticate the public key.
附图说明Description of drawings
本发明将通过具体实例及附图的方式说明,其中:The present invention will be illustrated by way of specific examples and accompanying drawings, wherein:
图1为本发明具体实施的加密操作流程图;Fig. 1 is the encryption operation flowchart of the embodiment of the present invention;
图2为本发明具体实施的解密操作流程图;Fig. 2 is the decryption operation flowchart of the embodiment of the present invention;
图3是本发明的实施实例1的系统结构示意图。Fig. 3 is a schematic diagram of the system structure of Embodiment 1 of the present invention.
具体实施方式detailed description
为使本发明的方案技术和应用性更加清楚,下面结合具体实施实例和附图,对本发明作更详细的描述。In order to make the solution technology and applicability of the present invention clearer, the present invention will be described in more detail below in conjunction with specific implementation examples and accompanying drawings.
实施实例1Implementation example 1
参见图3,具体执行步骤包括私钥生成中心设定系统安全参数、密钥空间、消息空间、公开参数,生成属性集合中的公钥,具体描述如下:Referring to Figure 3, the specific execution steps include setting the system security parameters, key space, message space, and public parameters by the private key generation center, and generating the public key in the attribute set. The specific description is as follows:
(1)系统初始化(1) System initialization
(1.1)设系统安全参数为λ,p为大素数,G1表示阶为p的循环加法群,g∈G1表示G1的生成元,G2表示阶为p的循环乘法群。e表示双线性映射G1×G1→G2。定义一个安全的Hash函数H,H表示从G2映射到G1的安全哈希函数,代表用户属性的U个元素h1,h2,...,hu∈G1。用户私钥密钥空间为K∈G1,加密消息空间为G1。表示有限域Zp={0,1,...,p-1}去掉零元素所得到的集合。(1.1) Suppose the system security parameter is λ, p is a large prime number, G 1 represents the cyclic additive group of order p, g∈G 1 represents the generator of G 1 , and G 2 represents the cyclic multiplicative group of order p. e represents a bilinear map G 1 ×G 1 →G 2 . Define a secure Hash function H, H represents the secure hash function mapped from G 2 to G 1 , representing U elements h 1 , h 2 ,...,hu ∈ G 1 of user attributes. The user private key key space is K∈G 1 , and the encrypted message space is G 1 . Represents the set obtained by removing zero elements from the finite field Z p ={0,1,...,p-1}.
(1.2)私钥生成中心随机选取计算并得到公钥为ppub=(e(g,g)α,ga);主密钥为:msk=gα。(1.2) The private key generation center is randomly selected Calculate and obtain the public key as p pub =(e(g,g) α ,g a ); the master key as: msk=g α .
基于上述设定,得到的公开参数为:params=(G1,G2,p,g,e,H,ppub,U)。Based on the above settings, the obtained public parameters are: params=(G 1 , G 2 , p, g, e, H, p pub , U).
(1.3)私钥生成中心将公开参数params。(1.3) The private key generation center will publicize the parameter params.
(2)提取私钥(2) Extract the private key
(2.1)私钥生成中心得到用户属性信息集合S。(2.1) The private key generation center obtains the user attribute information set S.
(2.2)私钥生成中心随机选取并且根据主密钥msk和用户属性集合S计算 (2.2) The private key generation center is randomly selected And calculate according to master key msk and user attribute set S
(2.3)私钥生成中心将sk发送给属性集合为S的单个用户(若多个用户,随机选取多个t,产生不同的sk分别发送给不同的用户)。(2.3) The private key generation center sends sk to a single user whose attribute set is S (if there are multiple users, randomly select multiple t, generate different sk and send them to different users).
(3)加密(3) encryption
数据拥有者可以根据params,生成访问控制结构(Al×n,ρ),{ρ:ρ(i)∈G1,i∈{1,2...l}}代表矩阵第i行到属性空间的映射,并随机选取向量和计算然后随机选取r1,r2...rl∈Zp和计算密文CT:The data owner can generate an access control structure (A l×n ,ρ) according to the params, {ρ:ρ(i)∈G 1 ,i∈{1,2...l}} represents the i-th row of the matrix to the attribute space, and randomly select vectors and calculate Then randomly select r 1 ,r 2 ...r l ∈ Z p and calculate the ciphertext CT:
Cs=gs,Ct=Ms,C=MH(e(g,g)αs), C s =g s , C t =M s , C=MH(e(g,g) αs ),
然后将(CT,Al×n,ρ)发送给密文管理者。Then send (CT,A l×n ,ρ) to the ciphertext manager.
(4)解密(4) Decryption
(4.1)假设数据用户的属性集为S,则数据拥有者从私钥生成中心得到私钥sk,从密文管理者得到(CT,Al×n,ρ),定义且I={i:ρ(i)∈S}。(4.1) Assuming that the attribute set of the data user is S, the data owner obtains the private key sk from the private key generation center, and obtains (CT,A l×n ,ρ) from the ciphertext manager. Define And I={i:ρ(i)∈S}.
(4.2)如果S满足(Al×n,ρ),则根据可在多项式时间内计算出{ωi∈Zp}i∈I。(4.2) If S satisfies (A l×n ,ρ), then according to {ω i ∈ Z p } i∈I can be calculated in polynomial time.
(4.3)根据以上可以计算然后可以得到明文M=C/H(e(g,g)αs)。(4.3) According to the above, it can be calculated Then the plaintext M=C/H(e(g,g) αs ) can be obtained.
(5)比较(5) compare
(5.1)密文管理者输入给Test算法两个比较密文CT1、CT2。(5.1) The ciphertext manager inputs two comparison ciphertexts CT 1 and CT 2 to the Test algorithm.
(5.2)Test算法计算和如果两者相等,返回给密文管理者True,密文管理者则判定CT1和CT2是相同明文加密的密文。否则返回False,密文管理者可以判断CT1和CT2是不同明文加密的密文。(5.2) Test algorithm calculation and If the two are equal, return True to the ciphertext manager, and the ciphertext manager determines that CT 1 and CT 2 are ciphertexts encrypted with the same plaintext. Otherwise, it returns False, and the ciphertext manager can judge that CT 1 and CT 2 are ciphertexts encrypted with different plaintexts.
以上所述,仅为本发明的具体实施方式,本说明书(包括附加权利要求、摘要和附图)中所公开的任一特征,除非特别叙述,均可被其他等效或具有类似目的的替代特征加以替换,即除非特别叙述,每个特征只是一系列等效或类似特征中的一个例子。本发明可以扩展到任何在本说明书中披露的新特征或任何新的组合,以及披露的任一新的方法或过程的步骤或任何新的组合。The above is only a specific embodiment of the present invention. Any feature disclosed in this specification (including appended claims, abstract and drawings), unless specifically stated, can be replaced by other equivalent or similar purposes. Each feature is one example only of a series of equivalent or similar features, unless expressly stated otherwise. The present invention may extend to any new features or any new combination disclosed in this specification, as well as the steps of any new method or process or any new combination disclosed.
Claims (5)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610405495.5A CN106161428B (en) | 2016-06-08 | 2016-06-08 | A kind of ciphertext can comparison of equalization encryption attribute method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610405495.5A CN106161428B (en) | 2016-06-08 | 2016-06-08 | A kind of ciphertext can comparison of equalization encryption attribute method |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106161428A true CN106161428A (en) | 2016-11-23 |
| CN106161428B CN106161428B (en) | 2019-07-05 |
Family
ID=57352885
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201610405495.5A Expired - Fee Related CN106161428B (en) | 2016-06-08 | 2016-06-08 | A kind of ciphertext can comparison of equalization encryption attribute method |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106161428B (en) |
Cited By (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106549753A (en) * | 2016-10-18 | 2017-03-29 | 电子科技大学 | The encipherment scheme that a kind of support ciphertext of identity-based compares |
| CN108880796A (en) * | 2018-06-25 | 2018-11-23 | 电子科技大学 | It is a kind of for server efficiently based on the outsourcing decryption method of encryption attribute algorithm |
| CN109889332A (en) * | 2019-01-21 | 2019-06-14 | 电子科技大学 | Certificate-Based Equality Testing Encryption Method |
| CN109902501A (en) * | 2019-03-19 | 2019-06-18 | 中国海洋大学 | A structured encryption method and system for equality testing based on cloud service platform |
| CN110401667A (en) * | 2019-07-31 | 2019-11-01 | 杭州项帮科技有限公司 | A kind of encryption attribute method of the fraction key mechanism based on the mapping of entry type |
| CN110912897A (en) * | 2019-11-27 | 2020-03-24 | 郑州轻工业大学 | A book resource access control method based on ciphertext attribute authentication and threshold function |
| CN110943825A (en) * | 2019-12-12 | 2020-03-31 | 高胜法 | Perfect safety block cipher |
| CN113452706A (en) * | 2021-06-28 | 2021-09-28 | 长沙学院 | Attribute encryption method and system supporting numerical attribute comparison access strategy |
| CN113992397A (en) * | 2021-10-26 | 2022-01-28 | 电子科技大学 | An Efficient Public Key Encryption Method Supporting Differential Equality Testing |
| CN114756011A (en) * | 2022-05-27 | 2022-07-15 | 西安电子科技大学 | Intelligent home abnormity detection method based on TV-PKEET |
| CN116055058A (en) * | 2023-01-12 | 2023-05-02 | 北京邮电大学 | Privacy protection method for online car-hailing based on third-party operation privacy set intersection technology |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7634085B1 (en) * | 2005-03-25 | 2009-12-15 | Voltage Security, Inc. | Identity-based-encryption system with partial attribute matching |
| CN101944168A (en) * | 2009-07-09 | 2011-01-12 | 精品科技股份有限公司 | Electronic file authority control and management system |
| CN102546764A (en) * | 2011-12-20 | 2012-07-04 | 华中科技大学 | Safe access method of cloud storage system |
| US20120314854A1 (en) * | 2011-06-10 | 2012-12-13 | Zeutro, Llc | System, Apparatus and Method for Decentralizing Attribute-Based Encryption Information |
| US20140289513A1 (en) * | 2013-03-15 | 2014-09-25 | Arizona Board Of Regents On Behalf Of Arizona State University | Enabling Comparable Data Access Control for Lightweight Mobile Devices in Clouds |
-
2016
- 2016-06-08 CN CN201610405495.5A patent/CN106161428B/en not_active Expired - Fee Related
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7634085B1 (en) * | 2005-03-25 | 2009-12-15 | Voltage Security, Inc. | Identity-based-encryption system with partial attribute matching |
| CN101944168A (en) * | 2009-07-09 | 2011-01-12 | 精品科技股份有限公司 | Electronic file authority control and management system |
| US20120314854A1 (en) * | 2011-06-10 | 2012-12-13 | Zeutro, Llc | System, Apparatus and Method for Decentralizing Attribute-Based Encryption Information |
| CN102546764A (en) * | 2011-12-20 | 2012-07-04 | 华中科技大学 | Safe access method of cloud storage system |
| US20140289513A1 (en) * | 2013-03-15 | 2014-09-25 | Arizona Board Of Regents On Behalf Of Arizona State University | Enabling Comparable Data Access Control for Lightweight Mobile Devices in Clouds |
Cited By (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106549753A (en) * | 2016-10-18 | 2017-03-29 | 电子科技大学 | The encipherment scheme that a kind of support ciphertext of identity-based compares |
| CN108880796B (en) * | 2018-06-25 | 2021-04-27 | 电子科技大学 | Efficient outsourcing decryption method for server based on attribute encryption algorithm |
| CN108880796A (en) * | 2018-06-25 | 2018-11-23 | 电子科技大学 | It is a kind of for server efficiently based on the outsourcing decryption method of encryption attribute algorithm |
| CN109889332A (en) * | 2019-01-21 | 2019-06-14 | 电子科技大学 | Certificate-Based Equality Testing Encryption Method |
| CN109902501A (en) * | 2019-03-19 | 2019-06-18 | 中国海洋大学 | A structured encryption method and system for equality testing based on cloud service platform |
| CN109902501B (en) * | 2019-03-19 | 2021-09-17 | 中国海洋大学 | Structured encryption method and system for carrying out equivalence test based on cloud service platform |
| CN110401667B (en) * | 2019-07-31 | 2021-08-06 | 杭州项帮科技有限公司 | Attribute encryption method of multi-item mapping-based distributed key mechanism |
| CN110401667A (en) * | 2019-07-31 | 2019-11-01 | 杭州项帮科技有限公司 | A kind of encryption attribute method of the fraction key mechanism based on the mapping of entry type |
| CN110912897A (en) * | 2019-11-27 | 2020-03-24 | 郑州轻工业大学 | A book resource access control method based on ciphertext attribute authentication and threshold function |
| CN110912897B (en) * | 2019-11-27 | 2021-11-30 | 郑州轻工业大学 | Book resource access control method based on ciphertext attribute authentication and threshold function |
| CN110943825A (en) * | 2019-12-12 | 2020-03-31 | 高胜法 | Perfect safety block cipher |
| CN110943825B (en) * | 2019-12-12 | 2023-05-02 | 高胜法 | Perfect security block cipher |
| CN113452706A (en) * | 2021-06-28 | 2021-09-28 | 长沙学院 | Attribute encryption method and system supporting numerical attribute comparison access strategy |
| CN113452706B (en) * | 2021-06-28 | 2022-05-03 | 长沙学院 | Attribute encryption method and system supporting numerical attribute comparison access strategy |
| CN113992397A (en) * | 2021-10-26 | 2022-01-28 | 电子科技大学 | An Efficient Public Key Encryption Method Supporting Differential Equality Testing |
| CN114756011A (en) * | 2022-05-27 | 2022-07-15 | 西安电子科技大学 | Intelligent home abnormity detection method based on TV-PKEET |
| CN116055058A (en) * | 2023-01-12 | 2023-05-02 | 北京邮电大学 | Privacy protection method for online car-hailing based on third-party operation privacy set intersection technology |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106161428B (en) | 2019-07-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106161428B (en) | A kind of ciphertext can comparison of equalization encryption attribute method | |
| Li et al. | Full verifiability for outsourced decryption in attribute based encryption | |
| CN109246096B (en) | A Versatile Fine-Grained Access Control Approach for Cloud Storage | |
| Li et al. | TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage | |
| CN104113408B (en) | It is a kind of realize the revocation of timely user property based on ciphertext policy ABE encryption method | |
| CN106375346B (en) | A data protection method based on conditional broadcast proxy re-encryption in cloud environment | |
| CN103401839B (en) | A kind of many authorization center encryption method based on attribute protection | |
| CN109246098B (en) | A Method for Supporting Synchronous Ciphertext Comparison of Backup Servers | |
| CN106549753B (en) | A kind of encryption method that the support ciphertext of identity-based compares | |
| CN105933345B (en) | A Verifiable Outsourcing Attribute-Based Encryption Method Based on Linear Secret Sharing | |
| CN106789044B (en) | Searchable encryption method for cipher text data public key stored in cloud on grid under standard model | |
| CN110933033B (en) | Cross-domain access control method for multiple IoT domains in smart city environment | |
| CN107154845B (en) | An Attribute-Based Outsourcing Scheme for BGN-Type Ciphertext Decryption | |
| CN104320393B (en) | The controllable efficient attribute base proxy re-encryption method of re-encryption | |
| CN105763528B (en) | The encryption device of diversity person's anonymity under a kind of mixed mechanism | |
| WO2021190452A1 (en) | Lightweight attribute-based signcryption method for cloud and fog-assisted internet of things | |
| WO2016112734A1 (en) | Group encryption and decryption method and system having selection and exclusion functions | |
| CN108880796A (en) | It is a kind of for server efficiently based on the outsourcing decryption method of encryption attribute algorithm | |
| Wang et al. | A pre-authentication approach to proxy re-encryption in big data context | |
| CN113794561A (en) | Public key searchable encryption method and system | |
| CN109981265A (en) | A kind of ciphertext equivalence determination method without using Bilinear map of identity-based | |
| CN106878322A (en) | An Encryption and Decryption Method Based on Attribute-Based Fixed-length Ciphertext and Key | |
| CN105025021B (en) | Principal disjunctive normal form access strategy based on encryption attribute method on lattice | |
| Lv et al. | A secure and efficient revocation scheme for fine-grained access control in cloud storage. | |
| CN111966802A (en) | Attribute-based encryption method and system supporting keyword Boolean search |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190705 |
|
| CF01 | Termination of patent right due to non-payment of annual fee |