CN110011963A - The information processing method with the more authorization CP-ABE effectively cancelled based on OBDD - Google Patents

The information processing method with the more authorization CP-ABE effectively cancelled based on OBDD Download PDF

Info

Publication number
CN110011963A
CN110011963A CN201910144478.4A CN201910144478A CN110011963A CN 110011963 A CN110011963 A CN 110011963A CN 201910144478 A CN201910144478 A CN 201910144478A CN 110011963 A CN110011963 A CN 110011963A
Authority
CN
China
Prior art keywords
user
attribute
obdd
abe
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910144478.4A
Other languages
Chinese (zh)
Inventor
刘雪峰
武文佳
裴庆祺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201910144478.4A priority Critical patent/CN110011963A/en
Publication of CN110011963A publication Critical patent/CN110011963A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to field of information security technology, disclose a kind of information processing method with the more authorization CP-ABE effectively cancelled based on OBDD;Establish access control system model;Cloud Server, attribute certification authority, Attribute Authority and user in network is abstracted into a connected graph;It converts access strategy to the form of Ordered Binary Decision Diagrams, private data is encrypted, and the ciphertext of return is uploaded into Cloud Server;Attribute certification authority first authenticates the id of each user;User is decrypted with the decruption key of oneself;When the revocation of user's determinant attribute occurs, Update attribute agency key pair part relevant to the attribute carries out re-encryption, again dispatch user key to ciphertext.The present invention realizes more authoring systems based on OBDD;The system effectiveness problem based on Tree and LSSS is not only solved, the attribute revocation and user's revocation function not having based on the mono- authoring system of OBDD are also achieved.

Description

The information processing method with the more authorization CP-ABE effectively cancelled based on OBDD
Technical field
The invention belongs to field of information security technology more particularly to it is a kind of based on OBDD with the more authorizations effectively cancelled The information processing method of CP-ABE.
Background technique
Currently, the immediate prior art: in order to ensure information security, CP-ABE (ciphertext policy Attribute based encryption ciphertext policy ABE based encryption system) system is in many network physical systems and Internet of Things It is widely used in net system;Also be broadly divided into several respects for CP-ABE systematic research: access structure is authorized more, is removed Pin, hiding strategy and proxy re-encryption.
Initial CP-ABE system was suggested in 2007, and access strategy Tree, ciphertext form is not only complicated, but also number It is directly proportional to the quantity of attribute in property set according to size, the program be based on single authorization identifying, once the certification authority is attacked Broken, whole system will be destroyed, so, in order to mitigate such harm, propose within 2011 distributed encryption attribute system System, without central authority, all system initializations and key, cipher text part are generated by all association attributes mechanisms, greatly Alleviate the crisis singly authorized greatly, the system be based on linear privacy sharing matrix, however its ciphertext size and encryption, solution Close loss is also directly proportional.
Before new access strategy does not put forward, existing research is all based on changing for above two papers progress Into, including Encrypt and Decrypt outsourcing, after single authorization attribute encrypted access control system of the proposition based on OBDD in 2017, new generation The gate on boundary is turned on, and in recent years, OBDD is also used in the application of Internet of Things, and OBDD is a nonmonotonic access Structure, the attribute in access strategy can occur repeatedly, positive value and negative value can also occur, and support AND, OR and NOT, this It is not available for Tree and LSSS, the program greatly reduces the loss of entire encryption process, because all parts are all Only and property set relevant to access strategy is related, no matter how user property or all property sets change, as long as access plan Slightly association attributes are constant, then ciphertext size, user key etc. would not change.This article is without reference to user, category Property revocation, and as mentioned above, the risk of Dan Shouquan is relatively high, it is achieved that system can be revoked in more authorization based on OBDD It is meaningful.
The prior art one introduces multiple authorizations using distributed structure based on more authorization CP-ABE systems of LSSS Mechanism is based on this article, and there are also its many modified versions in recent years, but in its ciphertext size and algorithmic procedure plus solution Close loss is all directly proportional to number of attributes always, that is to say, that, can be corresponding when attribute concentrates number of attributes to be increasing To encryption and decryption algorithm increase computation burden because the algorithm of encryption and decryption be according to attribute generate component.The prior art two A kind of single authorization CP-ABE system based on OBDD is proposed, substantially increases efficiency of algorithm and storage consumption, but list authorizes The safety problem of certification still has, and the algorithm realization of Dan Shouquan is relatively easy, but single authorization requirement must be to the authorization machine The absolute trust of structure, once attacker breaks through the mechanism, that all data will face a danger, and in practical application, user Attribute should be it is variable, the prior art two be not carried out attribute revocation, enable the property set flexibility and changeability of user, be based on certainly There are many attribute cancelling method of other access strategy, need to be extended on the basis of technology two, form more authorization identifyings Risk is reduced, while realizing the attribute cancelling method for adapting to the algorithm.
In conclusion problem of the existing technology is:
(1) encryption and decryption in ciphertext size and algorithmic procedure of the prior art one based on more authorization CP-ABE systems of LSSS It is lost all directly proportional to number of attributes always.
(2) safety problem of single authorization CP-ABE system list authorization identifying of the prior art two based on OBDD still has, And in practical application, the attribute of user should be it is variable, the system be not carried out attribute revocation.
Solve the difficulty of above-mentioned technical problem:
Efficiency of algorithm is exactly the ultimate aim pursued all the time, but before the efficiency of algorithm based on LSSS anyway Outsourcing, foundation is directly proportional with number of attributes forever, so just there is the algorithm based on OBDD, the efficiency of the algorithm Only and property set relevant with access strategy is related, as long as the property set is constant, efficiency is fixed forever, but the skill at present Art singly authorizes, the CP-ABE system based on LSSS have developed into authorize, and be trend of the times, and attribute Revocation has different methods for different algorithms, so needing to realize more authorization CP- based on OBDD with effectively cancelling ABE system.
Solve the meaning of above-mentioned technical problem:
If these problems are addressed, in the scope of encryption attribute system, efficiency of algorithm can obtain very big Improve, many computed losses and memory headroom can be saved, realizes attribute revocation, whole system can be allowed more flexible, in Internet of Things It is used widely in net system and actual application.
Summary of the invention
In view of the problems of the existing technology, the present invention provides a kind of based on OBDD with the more authorizations effectively cancelled The information processing method of CP-ABE.
The invention is realized in this way a kind of information processing with the more authorization CP-ABE effectively cancelled based on OBDD Method, the information processing method with the more authorization CP-ABE effectively cancelled based on OBDD include:
Cloud Server, attribute certification authority, Attribute Authority and user in network is abstracted into a company by the first step Logical figure, establishes access control system model;
Second step, system first initialize a Bilinear Groups and a bilinear map, attribute relevant to access strategy Mechanism reruns initialization algorithm, generates corresponding master key pair;
Third step converts access strategy to the form of Ordered Binary Decision Diagrams, encrypts to private data, and will return The ciphertext returned uploads to Cloud Server;
4th step, attribute certification authority first authenticate the id of each user, and after certification, Attribute Authority is each use Family generates key module, is sent to user;
5th step, user are decrypted with the decruption key of oneself, search the process whether user property collection meets OBDD It is a recursive process, by recurrence, if the property set of user meets OBDD, private data can be calculated, Otherwise, decryption failure;
6th step, when the revocation of user's determinant attribute occurs, Update attribute agency key pair part relevant to the attribute, Re-encryption, again dispatch user key are carried out to ciphertext.
Further, the form for converting access strategy to Ordered Binary Decision Diagrams of the second step, to private data into Row encryption, and the ciphertext of return is uploaded into Cloud Server and is completed by Attribute Authority, it shares N number of relevant to access strategy Attribute mechanism, current attribute mechanism are j, and the tactful association attributes of each attribute organization management are UjIt is a, with tactful association attributes Shared n, i.e. ∑ Uj=n;Each attribute mechanism randomly chooses yj、tj0、tj1、…、...、t′j0、t′j1、…、Meter It calculatesN is then generated to following public private key pair:
PKjIt is sent to data owner to encrypt, MKjIt is saved as private key oneself.
Further, access strategy is first converted Boolean function by the Ordered Binary Decision Diagrams of the third step;By boolean's letter The decision diagram that base is converted into attribute sequence π;For ciphertext, it is divided into four components, is OBDD first, then select secret Close value s is calculatedWherein M is private data, it is then assumed that the association attributes collection in each path is combined into I, is calculated and every Bar relevant ciphertext component of active pathFinally ciphertext is uploaded.
Further, the certification authority of the 4th step can only recognize the identity of user before generating user key Card;If the id of user is not in user's revocation list, then selection random number calculates user key component.
Further, the recursive procedure for Ordered Binary Decision Diagrams of the 5th step specifically includes:
(a) node that ordinal number is 2, that is, root node root are found in OBDD, are labeled as present node;
(b) label of present node is obtainedFor i ∈ n, if i ∈ S ∧i=i is then jumped toward step (c), ifIt then jumps toward step (d);
(c) its 1 branch is found according to the high value of present node, if:
1) the 1 of present node branches into terminal nodeTerminate recurrence, returns to decryption failure;
2) the 1 of present node branches into terminal nodeJump to step (e);
3) the 1 of present node branches into nonterminal node, then 1 branch is defined as present node, jumps to step again (b);
(d) its 0 branch is found according to the low value of present node, if:
The 0 of present node branches into terminal nodeTerminate recurrence, returns to decryption failure;
The 0 of present node branches into terminal nodeJump to step (e);
The 0 of present node branches into nonterminal node, then 0 branch is defined as present node, jumps to step (b) again;
(e) by this active pathWith corresponding path RtIt is stored, i.e., the property set of user, which meets, visits It asks strategy, carries out following operation:
Finally terminate recurrence, returns to successful decryption.
Further, the attribute revocation of the 6th step refers to that some determinant attribute of some user is revoked, at this time system Update only needs to select the corresponding stochastic variable of the attribute, and user's revocation refers to that the user of user collection removes from system Pin, system update needs to update all relevant attribute stochastic variables with property policy at this time.
Another object of the present invention is to provide described in a kind of execution based on OBDD with the more authorization CP- effectively cancelled The information processing method of ABE based on OBDD with the more authorization CP-ABE systems effectively cancelled, the band based on OBDD The more authorization CP-ABE systems effectively cancelled include:
Cloud Server is connect with data consumer, for storing the ciphertext uploaded;
User identity authentication mechanism initially first distributes unique identities for each system user, is then generating the key stage User identity is authenticated, and carries out the maintenance of attribute revocation list, is furthermore not involved in any specific algorithm;
More authorized organizations, mechanism is connect with user identity authentication, and the initialization and user key for system generate, and The system update carried out when attribute revocation;
Access strategy and ciphertext processing module, connect with Cloud Server, for the formulation of access strategy and the generation of ciphertext With upload;
Data consumer connect with more authorized organizations, for requesting ciphertext to CSS and being decrypted.
Another object of the present invention is to provide described in a kind of application based on OBDD with the more authorization CP- effectively cancelled The ciphertext policy ABE based encryption system of the information processing method of ABE.
Another object of the present invention is to provide described in a kind of application based on OBDD with the more authorization CP- effectively cancelled The information security processing system of the information processing method of ABE.
Another object of the present invention is to provide described in a kind of application based on OBDD with the more authorization CP- effectively cancelled The information processing method information data processing terminal of ABE.
Below from storage loss, loss of communications and the computed losses of angle contrast's prior art one of data and scheme.Table One describes two schemes in the performance comparison of storage and communication aspects, and table two describes performance of two schemes in terms of calculating Comparison.Wherein, tpIt indicates to ask consume a maximum time to operation, tGIndicate the maximum time that a power operation is sought in group G Consumption,It indicates in group GTIn ask the maximum time an of power operation to consume, U indicates the size of whole property sets, UCTIndicate close The size of property set in text, i.e., the size of association attributes collection, U in access strategySIndicate user property collection size, lMIndicate privacy The size of data M, | G |, | GT| indicate two orders of a group.
One: two kind of technology of table compares in the performance of storage and communication aspects
Performance of two: the two kinds of technologies of table in terms of calculating compares
In conclusion advantages of the present invention and good effect are as follows: system of the invention is changed from access strategy, real More authoring systems based on OBDD are showed;The system effectiveness problem based on Tree and LSSS is not only solved, also achieves and is based on The attribute revocation and user's revocation function that the mono- authoring system of OBDD does not have.
Detailed description of the invention
Fig. 1 is the structure with the more authorization CP-ABE systems effectively cancelled provided in an embodiment of the present invention based on OBDD Schematic diagram;
In figure: 1, Cloud Server;2, user identity authentication mechanism;3, more authorized organizations;4, access strategy and ciphertext processing Module;5, data consumer.
Fig. 2 is the information processing with the more authorization CP-ABE effectively cancelled provided in an embodiment of the present invention based on OBDD Method flow diagram.
Fig. 3 is the information processing with the more authorization CP-ABE effectively cancelled provided in an embodiment of the present invention based on OBDD Method implementation flow chart.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to Limit the present invention.
Present invention is mainly used for the fine-grained access control systems realized under cloud environment.The present invention is based on access strategies to be Single authorization ABE system of OBDD, is extended system, realizes more authorization CP-ABE systems, and cancel with effective attribute It is cancelled with user, and demonstrates safety.
Application principle of the invention is further described with reference to the accompanying drawing.
As shown in Figure 1, it is provided in an embodiment of the present invention based on OBDD with the more authorization CP-ABE systems effectively cancelled It include: Cloud Server 1, user identity authentication mechanism 2, more authorized organizations 3, access strategy and ciphertext processing module 4, data use Person 5.
CSS is Cloud Server 1, is connect with data consumer 5, for storing the ciphertext uploaded;
CA is user identity authentication mechanism 2, initially first distributes unique identities for each system user, is then generating key Stage authenticates user identity, and carries out the maintenance of attribute revocation list, is furthermore not involved in any specific algorithm;
AAs is more authorized organizations 3, is connect with user identity authentication mechanism 2, and the initialization and user key for system are raw At, and the system update carried out when attribute revocation;
DO access strategy and ciphertext processing module 4, connect with Cloud Server 1, the formulation and ciphertext for access strategy It generates and uploads;
DU data consumer 5 connect with more authorized organizations 3, for requesting ciphertext to CSS and being decrypted.
As shown in Fig. 2, the letter with the more authorization CP-ABE effectively cancelled provided in an embodiment of the present invention based on OBDD Cease processing method the following steps are included:
S201: access control system model is established: by Cloud Server, attribute certification authority, the attribute management machine in network Structure and user are abstracted into a connected graph;
S202: initialization system data: system first initializes a Bilinear Groups and a bilinear map, then with visit Ask that policy-related (noun) attribute mechanism reruns initialization algorithm, generates corresponding master key pair;
S203: encryption private data: data owner selects access strategy, and random message has converted access strategy to The form of sequence Binary Decision Diagrams, then encrypts private data, and the ciphertext of return is uploaded to Cloud Server;
S204: generate key: attribute certification authority first authenticates the id of each user, after certification, Attribute Authority Key module is generated for each user, is sent to user;If not executing the algorithm by certification;
S205: user's decryption: user is decrypted with the decruption key of oneself, searches whether user property collection meets OBDD Process be a recursive process, by recurrence, if the property set of user meets OBDD, privacy can be calculated Data, otherwise, decryption failure;
S206: user, attribute revocation: when the revocation of user's determinant attribute occurs, need to update three parts, a part For Update attribute agency key pair part relevant to the attribute;The mechanism for managing the attribute reselects random number, and second Part needs to carry out re-encryption to ciphertext, and Part III is again dispatch user key.When generation user integrally cancels, It is also three steps, reruns initialization, encryption, key generation step.
Application principle of the invention is further described with reference to the accompanying drawing.
As shown in figure 3, the letter with the more authorization CP-ABE effectively cancelled provided in an embodiment of the present invention based on OBDD Cease processing method specifically includes the following steps:
Step 1 establishes access control system model.
Data owner, cloud, authoritative institution and data consumer are abstracted as the corresponding model in Fig. 3, are linked to be connected graph.
Step 2 initializes system data.
Assuming that sharing N number of attribute relevant to access strategy mechanism, current attribute mechanism is j, each attribute organization management Tactful association attributes be UjIt is a, it is assumed that share n with tactful association attributes, i.e. ∑ Uj=n.Each attribute mechanism random selection yj、tj0、tj1、…、t′j0、t′j1、…、It calculatesN is then generated to following public private key pair:
Then PKjIt is sent to data owner to encrypt, MKjIt is saved as private key oneself.
Step 3 encrypts private data.
Assuming that the active path in Ordered Binary Decision Diagrams, i.e.,Collection be combined into R:{ R0,R1,...,RT-1, User randomly chooses secret value s ∈ Zp, calculateWherein M is Then private data calculates ciphertext component relevant to every active pathAssuming that the association attributes set in each path For I, thenThen final ciphertext are as follows:
Then ciphertext is uploaded to Cloud Server by data owner.
Step 4 generates key.
Data consumer in system initially all can distribute one disclosed in unique identity id, by authentication mechanism (CA) carry out, which cannot participate in any specific algorithm of a step, in key generation phase, first verify user id whether In the list of oneself maintenance, i.e., either with or without user's revocation occurs, if directly terminating the algorithm in user's revocation list, Key failure is generated, if not existing, relevant mechanism j selects Stochastic r with access strategyj∈Zp, computation key componentProperty set I relevant to each path is traversed and is judged, i.e. i ∈ I, if i ∈ S ∧i=i, then enableti = ti;IfThen enableti =t 'i, computation key componentThe private key of end user Are as follows:
Step 5, user's decryption.
Authentication mechanism first verifies the identity id of user, if id, in revocation list, server is not given any Return value, if by certification, ciphertext is returned to user and is decrypted by Cloud Server.Specific decrypting process is exactly a needle To a recursive process of Ordered Binary Decision Diagrams, following five steps are shared:
(a) node that ordinal number is 2, that is, root node root are found in OBDD, are labeled as present node.
(b) label of present node is obtainedFor i ∈ n, if i ∈ S ∧i=i is then jumped toward step (c), ifIt then jumps toward step (d).
(c) its 1 branch is found according to the high value of present node, if
1) the 1 of present node branches into terminal nodeTerminate recurrence, returns to decryption failure.
2) the 1 of present node branches into terminal nodeJump to step (e).
3) the 1 of present node branches into nonterminal node, then 1 branch is defined as present node, jumps to step again (b)。
(d) its 0 branch is found according to the low value of present node, if
The 0 of present node branches into terminal nodeTerminate recurrence, returns to decryption failure.
The 0 of present node branches into terminal nodeJump to step (e).
The 0 of present node branches into nonterminal node, then 0 branch is defined as present node, jumps to step again (b)。
(e) by this active pathWith corresponding path RtIt is stored, i.e., the property set of the user meets Access strategy.Then following operation is carried out:
Finally terminate recurrence, returns to successful decryption.
Step 6, user, attribute revocation.
When the revocation of user's determinant attribute occurs, need to update three parts, a part is Update attribute agency key To part relevant to the attribute, second part needs to carry out re-encryption to ciphertext, and Part III is again dispatch user key. Specific algorithm arrangement is, as the determinant attribute a of user A1When revocation has occurred, manage the attribute attribute mechanism can select with Machine number m1、m′1, then update key pair (t1,t′1) it is (t1·m1,t′1·m′1), thus in public keyThen Encryption Algorithm is reruned, is updated and attribute a1Ciphertext component on relevant active pathIt is uploaded to Cloud Server, is finally run again for user and generates key algorithm, updates key moduleIt is distributed to user.
When user's revocation occurs, equally it is also required to carry out three step updates, system key is to, ciphertext and key;If User collects { id1,id2User's revocation has occurred, then Setup algorithm is reruned, all and policy-related (noun) attribute variable will It is updated, then reruns Encrypt Encryption Algorithm, ciphertext is uploaded to server, finally reruns KeyGen key Generating algorithm, authentication mechanism first verify the id of user whether in revocation list;Failed regeneration is directly returned to if, no New key is generated for active user by attribute mechanism again if, is finally distributed to associated user.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (10)

1. a kind of information processing method with the more authorization CP-ABE effectively cancelled based on OBDD, which is characterized in that described The information processing method with the more authorization CP-ABE effectively cancelled based on OBDD includes:
Cloud Server, attribute certification authority, Attribute Authority in network is abstracted into one with user and is connected to by the first step Figure, establishes access control system model;
Second step, system first initialize a Bilinear Groups and a bilinear map, attribute relevant to access strategy mechanism Rerun initialization algorithm, generates corresponding master key pair;
Third step converts access strategy to the form of Ordered Binary Decision Diagrams, encrypts to private data, and by return Ciphertext uploads to Cloud Server;
4th step, attribute certification authority first authenticate the id of each user, and after certification, Attribute Authority is raw for each user At key module, it is sent to user;
5th step, user are decrypted with the decruption key of oneself, and searching user property collection whether to meet the process of OBDD is one A recursive process, if the property set of user meets OBDD, can calculate private data by recurrence, otherwise, Decryption failure;
6th step, when the revocation of user's determinant attribute occurs, Update attribute agency key pair part relevant to the attribute, to close Text carries out re-encryption, again dispatch user key.
2. the information processing method with the more authorization CP-ABE effectively cancelled based on OBDD as described in claim 1, It being characterized in that, the form for converting access strategy to Ordered Binary Decision Diagrams of the second step encrypts private data, And the ciphertext of return is uploaded into Cloud Server and is completed by Attribute Authority, share N number of attribute machine relevant to access strategy Structure, current attribute mechanism are j, and the tactful association attributes of each attribute organization management are UjIt is a, n is shared with tactful association attributes It is a, i.e. ∑ Uj=n;Each attribute mechanism random selectionMeter It calculatesN is then generated to following public private key pair:
PKjIt is sent to data owner to encrypt, MKjIt is saved as private key oneself.
3. the information processing method with the more authorization CP-ABE effectively cancelled based on OBDD as described in claim 1, It is characterized in that, access strategy is first converted Boolean function by the Ordered Binary Decision Diagrams of the third step;Boolean function is based on The decision diagram that attribute sequence π is converted into;For ciphertext, it is divided into four components, is OBDD first, then selects secret value s, It calculatesWherein M is private data, it is then assumed that the association attributes collection in each path is combined into I, is calculated with every effectively The relevant ciphertext component in pathFinally ciphertext is uploaded.
4. the information processing method with the more authorization CP-ABE effectively cancelled based on OBDD as described in claim 1, It is characterized in that, the certification authority of the 4th step, the identity of user can only be authenticated before generating user key;If The id of user is not in user's revocation list, then selection random number calculates user key component.
5. the information processing method with the more authorization CP-ABE effectively cancelled based on OBDD as described in claim 1, It is characterized in that, the recursive procedure for Ordered Binary Decision Diagrams of the 5th step specifically includes:
(a) node that ordinal number is 2, that is, root node root are found in OBDD, are labeled as present node;
(b) label of present node is obtainedFor i ∈ n, if i ∈ S ∧i=i is then jumped toward step (c), ifIt then jumps toward step (d);
(c) its 1 branch is found according to the high value of present node, if:
1) the 1 of present node branches into terminal nodeTerminate recurrence, returns to decryption failure;
2) the 1 of present node branches into terminal nodeJump to step (e);
3) the 1 of present node branches into nonterminal node, then 1 branch is defined as present node, jumps to step (b) again;
(d) its 0 branch is found according to the low value of present node, if:
The 0 of present node branches into terminal nodeTerminate recurrence, returns to decryption failure;
The 0 of present node branches into terminal nodeJump to step (e);
The 0 of present node branches into nonterminal node, then 0 branch is defined as present node, jumps to step (b) again;
(e) by this active pathWith corresponding path RtIt is stored, i.e., the property set of user meets access plan Slightly, following operation is carried out:
Finally terminate recurrence, returns to successful decryption.
6. the information processing method with the more authorization CP-ABE effectively cancelled based on OBDD as described in claim 1, It is characterized in that, the attribute revocation of the 6th step refers to that some determinant attribute of some user is revoked, at this time system update It needs to select the corresponding stochastic variable of the attribute, and user's revocation refers to that the user of user collection cancels from system, this When system update need to update whole relevant attribute stochastic variables with property policy.
7. a kind of perform claim requires 1 information processing method with the more authorization CP-ABE effectively cancelled based on OBDD Based on OBDD with the more authorization CP-ABE systems effectively cancelled, which is characterized in that it is described based on OBDD with effective Revocation more authorization CP-ABE systems include:
Cloud Server is connect with data consumer, for storing the ciphertext uploaded;
User identity authentication mechanism, initially first for each system user distribute unique identities, then generate the key stage to Family identity is authenticated, and carries out the maintenance of attribute revocation list, is furthermore not involved in any specific algorithm;
More authorized organizations, mechanism is connect with user identity authentication, and the initialization and user key for system generate, and surely belong to Property revocation when the system update that carries out;
Access strategy and ciphertext processing module, connect with Cloud Server, for access strategy formulation and ciphertext generation with It passes;
Data consumer connect with more authorized organizations, for requesting ciphertext to CSS and being decrypted.
8. it is a kind of using described in claim 1~6 any one based on OBDD with the more authorization CP-ABE's effectively cancelled The ciphertext policy ABE based encryption system of information processing method.
9. it is a kind of using described in claim 1~6 any one based on OBDD with the more authorization CP-ABE's effectively cancelled The information security processing system of information processing method.
10. it is a kind of using described in claim 1~6 any one based on OBDD with the more authorization CP-ABE's effectively cancelled Information processing method information data processing terminal.
CN201910144478.4A 2019-02-27 2019-02-27 The information processing method with the more authorization CP-ABE effectively cancelled based on OBDD Pending CN110011963A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910144478.4A CN110011963A (en) 2019-02-27 2019-02-27 The information processing method with the more authorization CP-ABE effectively cancelled based on OBDD

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910144478.4A CN110011963A (en) 2019-02-27 2019-02-27 The information processing method with the more authorization CP-ABE effectively cancelled based on OBDD

Publications (1)

Publication Number Publication Date
CN110011963A true CN110011963A (en) 2019-07-12

Family

ID=67166072

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910144478.4A Pending CN110011963A (en) 2019-02-27 2019-02-27 The information processing method with the more authorization CP-ABE effectively cancelled based on OBDD

Country Status (1)

Country Link
CN (1) CN110011963A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917721A (en) * 2020-06-28 2020-11-10 石家庄铁道大学 Attribute encryption method based on block chain
CN112217641A (en) * 2020-10-21 2021-01-12 桂林电子科技大学 Ciphertext strategy attribute-based encryption method based on ADD (additive addition) supporting read-write function
CN113055168A (en) * 2021-03-29 2021-06-29 陕西师范大学 Ciphertext strategy attribute encryption method supporting strategy hiding and attribute updating

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297227A (en) * 2013-07-02 2013-09-11 西安电子科技大学 Attribute-based encryption supporting flexible and direct-revocatory ciphertext policy
CN103618728A (en) * 2013-12-04 2014-03-05 南京邮电大学 Attribute-based encryption method for multiple authority centers
EP2983143A1 (en) * 2014-08-06 2016-02-10 Gemalto SA Security management system for revoking a token from at least one service provider terminal of a service provider system
CN106850224A (en) * 2017-04-13 2017-06-13 桂林电子科技大学 A kind of ciphertext policy ABE base encryption method of private key fixed length

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297227A (en) * 2013-07-02 2013-09-11 西安电子科技大学 Attribute-based encryption supporting flexible and direct-revocatory ciphertext policy
CN103618728A (en) * 2013-12-04 2014-03-05 南京邮电大学 Attribute-based encryption method for multiple authority centers
EP2983143A1 (en) * 2014-08-06 2016-02-10 Gemalto SA Security management system for revoking a token from at least one service provider terminal of a service provider system
CN106850224A (en) * 2017-04-13 2017-06-13 桂林电子科技大学 A kind of ciphertext policy ABE base encryption method of private key fixed length

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
LONG LI ETC: "A Ciphertext-Policy Attribute-Based Encryption", 《IEEE ACCESS》 *
WEI GUAN: "Reliability Analysis of the Internet of Things Based on", 《INTERNATIONAL JOURNAL OF ONLINE ENGINEERING》 *
李琦: "快速解密且私钥定长的密文策略属性基加密方案", 《电子与信息学报》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917721A (en) * 2020-06-28 2020-11-10 石家庄铁道大学 Attribute encryption method based on block chain
CN111917721B (en) * 2020-06-28 2022-04-05 石家庄铁道大学 Attribute encryption method based on block chain
CN112217641A (en) * 2020-10-21 2021-01-12 桂林电子科技大学 Ciphertext strategy attribute-based encryption method based on ADD (additive addition) supporting read-write function
CN112217641B (en) * 2020-10-21 2022-09-27 桂林电子科技大学 Ciphertext strategy attribute-based encryption method based on ADD (additive addition) supporting read-write function
CN113055168A (en) * 2021-03-29 2021-06-29 陕西师范大学 Ciphertext strategy attribute encryption method supporting strategy hiding and attribute updating
CN113055168B (en) * 2021-03-29 2022-06-24 陕西师范大学 Ciphertext strategy attribute encryption method supporting strategy hiding and attribute updating

Similar Documents

Publication Publication Date Title
CN110099043B (en) Multi-authorization-center access control method supporting policy hiding and cloud storage system
CN109829326B (en) Cross-domain authentication and fair audit de-duplication cloud storage system based on block chain
CN111130757A (en) Multi-cloud CP-ABE access control method based on block chain
CN114039790B (en) Fine-grained cloud storage security access control method based on blockchain
CN108833393A (en) A kind of revocable data sharing method calculated based on mist
CN107359986A (en) The outsourcing encryption and decryption CP ABE methods of user revocation
Namasudra et al. Secure and efficient data access control in cloud computing environment: a survey
CN107465681B (en) Cloud computing big data privacy protection method
CN115296817B (en) Data access control method based on block chain technology and attribute encryption
CN106788988B (en) Voidable key polymerize encryption method under cloud environment
CN110061983A (en) A kind of data processing method and system
CN107547530A (en) On-line/off-line keyword search methodology and its cloud computing application system based on attribute under mobile cloud environment
CN110933033A (en) Cross-domain access control method for multiple Internet of things domains in smart city environment
CN110011963A (en) The information processing method with the more authorization CP-ABE effectively cancelled based on OBDD
Gao et al. Blockchain based secure IoT data sharing framework for SDN-enabled smart communities
CN113360944A (en) Dynamic access control system and method for power internet of things
Liu et al. Dynamic attribute-based access control in cloud storage systems
Sammy et al. An Efficient Blockchain Based Data Access with Modified Hierarchical Attribute Access Structure with CP‐ABE Using ECC Scheme for Patient Health Record
Nie et al. Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT
Chaudhari et al. A comprehensive survey on public auditing for secure cloud storage
Hahn et al. Verifiable outsourced decryption of encrypted data from heterogeneous trust networks
CN113630448A (en) Distributed encryption storage method and system, computer device and readable storage medium
Shi et al. Secure government data sharing based on blockchain and attribute-based encryption
Tian et al. Fine‐grained assured insertion and deletion scheme based on onion encryption in cloud storage
CN114039737B (en) Attribute-based shared data storage and access method and system for resisting selective plaintext attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20220920