Decentralization attribute-based encryption method supporting complete policy hiding

The invention discloses a decentralized attribute-based encryption method supporting complete strategy hiding. The decentralized attribute-based encryption method adopts a decentralized multi-authority attribute-based encryption model to realize efficient privacy protection of data and user informat...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: DU GANG, ZHANG LONG, DAI WEIHUA, DAI YUE, SHAO YABIN, HOU KUNCHI, ZHANG KEJIA
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator DU GANG
ZHANG LONG
DAI WEIHUA
DAI YUE
SHAO YABIN
HOU KUNCHI
ZHANG KEJIA
description The invention discloses a decentralized attribute-based encryption method supporting complete strategy hiding. The decentralized attribute-based encryption method adopts a decentralized multi-authority attribute-based encryption model to realize efficient privacy protection of data and user information. First, a plurality of authorizations are set to avoid single point failure and key escrow problems. And secondly, anonymizing the attributes to realize a completely hidden access strategy so as to guarantee the privacy of the user. In the process, a reusable ciphertext pool and a cloud proxy server are respectively utilized by the method to reduce the computing cost of the encryption and decryption stages of the user. Finally, user information is uniquely bound with leaf nodes in the binary tree, malicious users are tracked through the leaf nodes, and the malicious users are revoked through partial ciphertext updating. The invention designs a multifunctional, safe and efficient attribute-based encryption schem
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN118264432A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN118264432A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN118264432A3</originalsourceid><addsrcrecordid>eNqNjT0KwkAQRtNYiHqH8QAp8oPYhqhYWaUPk93RDGx2h91JEU9vEA9g9cF7D75t1l3IkNeIjt-oHDygauRhVsoHTGSBvImLfNVEOgYLaRYJUdm_wIRJHCmBBMdmgZHtivfZ5oku0eG3u-x4u3btPScJPSXB9ZK0bx9FcS5PdV2VTfVP8wFVkDos</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Decentralization attribute-based encryption method supporting complete policy hiding</title><source>esp@cenet</source><creator>DU GANG ; ZHANG LONG ; DAI WEIHUA ; DAI YUE ; SHAO YABIN ; HOU KUNCHI ; ZHANG KEJIA</creator><creatorcontrib>DU GANG ; ZHANG LONG ; DAI WEIHUA ; DAI YUE ; SHAO YABIN ; HOU KUNCHI ; ZHANG KEJIA</creatorcontrib><description>The invention discloses a decentralized attribute-based encryption method supporting complete strategy hiding. The decentralized attribute-based encryption method adopts a decentralized multi-authority attribute-based encryption model to realize efficient privacy protection of data and user information. First, a plurality of authorizations are set to avoid single point failure and key escrow problems. And secondly, anonymizing the attributes to realize a completely hidden access strategy so as to guarantee the privacy of the user. In the process, a reusable ciphertext pool and a cloud proxy server are respectively utilized by the method to reduce the computing cost of the encryption and decryption stages of the user. Finally, user information is uniquely bound with leaf nodes in the binary tree, malicious users are tracked through the leaf nodes, and the malicious users are revoked through partial ciphertext updating. The invention designs a multifunctional, safe and efficient attribute-based encryption schem</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240628&amp;DB=EPODOC&amp;CC=CN&amp;NR=118264432A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25562,76317</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240628&amp;DB=EPODOC&amp;CC=CN&amp;NR=118264432A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>DU GANG</creatorcontrib><creatorcontrib>ZHANG LONG</creatorcontrib><creatorcontrib>DAI WEIHUA</creatorcontrib><creatorcontrib>DAI YUE</creatorcontrib><creatorcontrib>SHAO YABIN</creatorcontrib><creatorcontrib>HOU KUNCHI</creatorcontrib><creatorcontrib>ZHANG KEJIA</creatorcontrib><title>Decentralization attribute-based encryption method supporting complete policy hiding</title><description>The invention discloses a decentralized attribute-based encryption method supporting complete strategy hiding. The decentralized attribute-based encryption method adopts a decentralized multi-authority attribute-based encryption model to realize efficient privacy protection of data and user information. First, a plurality of authorizations are set to avoid single point failure and key escrow problems. And secondly, anonymizing the attributes to realize a completely hidden access strategy so as to guarantee the privacy of the user. In the process, a reusable ciphertext pool and a cloud proxy server are respectively utilized by the method to reduce the computing cost of the encryption and decryption stages of the user. Finally, user information is uniquely bound with leaf nodes in the binary tree, malicious users are tracked through the leaf nodes, and the malicious users are revoked through partial ciphertext updating. The invention designs a multifunctional, safe and efficient attribute-based encryption schem</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjT0KwkAQRtNYiHqH8QAp8oPYhqhYWaUPk93RDGx2h91JEU9vEA9g9cF7D75t1l3IkNeIjt-oHDygauRhVsoHTGSBvImLfNVEOgYLaRYJUdm_wIRJHCmBBMdmgZHtivfZ5oku0eG3u-x4u3btPScJPSXB9ZK0bx9FcS5PdV2VTfVP8wFVkDos</recordid><startdate>20240628</startdate><enddate>20240628</enddate><creator>DU GANG</creator><creator>ZHANG LONG</creator><creator>DAI WEIHUA</creator><creator>DAI YUE</creator><creator>SHAO YABIN</creator><creator>HOU KUNCHI</creator><creator>ZHANG KEJIA</creator><scope>EVB</scope></search><sort><creationdate>20240628</creationdate><title>Decentralization attribute-based encryption method supporting complete policy hiding</title><author>DU GANG ; ZHANG LONG ; DAI WEIHUA ; DAI YUE ; SHAO YABIN ; HOU KUNCHI ; ZHANG KEJIA</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN118264432A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2024</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>DU GANG</creatorcontrib><creatorcontrib>ZHANG LONG</creatorcontrib><creatorcontrib>DAI WEIHUA</creatorcontrib><creatorcontrib>DAI YUE</creatorcontrib><creatorcontrib>SHAO YABIN</creatorcontrib><creatorcontrib>HOU KUNCHI</creatorcontrib><creatorcontrib>ZHANG KEJIA</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>DU GANG</au><au>ZHANG LONG</au><au>DAI WEIHUA</au><au>DAI YUE</au><au>SHAO YABIN</au><au>HOU KUNCHI</au><au>ZHANG KEJIA</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Decentralization attribute-based encryption method supporting complete policy hiding</title><date>2024-06-28</date><risdate>2024</risdate><abstract>The invention discloses a decentralized attribute-based encryption method supporting complete strategy hiding. The decentralized attribute-based encryption method adopts a decentralized multi-authority attribute-based encryption model to realize efficient privacy protection of data and user information. First, a plurality of authorizations are set to avoid single point failure and key escrow problems. And secondly, anonymizing the attributes to realize a completely hidden access strategy so as to guarantee the privacy of the user. In the process, a reusable ciphertext pool and a cloud proxy server are respectively utilized by the method to reduce the computing cost of the encryption and decryption stages of the user. Finally, user information is uniquely bound with leaf nodes in the binary tree, malicious users are tracked through the leaf nodes, and the malicious users are revoked through partial ciphertext updating. The invention designs a multifunctional, safe and efficient attribute-based encryption schem</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN118264432A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Decentralization attribute-based encryption method supporting complete policy hiding
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T12%3A39%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=DU%20GANG&rft.date=2024-06-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN118264432A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true