期刊文献+

一种高效属性可撤销的属性基加密方案 被引量:7

An efficient attribute based encryption with attribute revocation
下载PDF
导出
摘要 密文策略的属性基加密(CP-ABE)可以实现数据拥有者定义的基于外挂加密数据的访问控制,使它在数据分享细粒度访问控制中有着良好的应用前景,然而在实际应用系统中仍然存在属性撤销方面急需解决的问题。在代理重加密技术和CP-ABE技术相结合的方案基础上,引入Shamir的秘密分享技术和树访问结构,实现了门限运算和布尔运算的结合,并且缩短了密钥和密文长度。与之前方案相比,在效率和表达能力方面有了明显的提高,此外该方案在判定双线性假设下是安全的。 Ciphertext-Policy Attribute Based Encryptlon (CP-ABE) can reahze access control ot encrypted aata detmecl by the data owner in the outsourcing system, making it promising on fine-grained access control of shared data. However, there are some problems of attribute revocation in the application system that urgently need to be solved. Based on the scheme of integrating the technique of proxy re-encryption into CP-ABE, this paper achieved the combination of threshold operator with Boolean operators and the shortened length of secret key and ciphertext by adopting the technology of Sharnir secret sharing and the tree access structure. Compared with some other schemes proposed before, some obvious improvements in expression and efficiency in this paper can be found. Besides, this scheme is proved safe on decisional bilinear Diffie-Hellman assumption.
出处 《计算机应用》 CSCD 北大核心 2012年第A01期39-43,共5页 journal of Computer Applications
基金 浙江省教育基金资助项目(Y200805048)
关键词 属性撤销 代理服务器 秘密分享 表达能力 安全性 attribute revocation proxy server secret sharing expressivity security
  • 相关文献

参考文献9

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1069
  • 2PIRREqq'I M, TRAYNOR P, McDANIEL P, et al. Secure attrib- ute-based systems[ C]// Proceedings of the ACM Conference on Computer and Communications Security. New York: ACM Press, 2006: 99-112. 被引量:1
  • 3BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy at- tribute-based encryption[ C]// Proceedings of the 2007 IEEE Sym- posium on Security and Privacy. Washington, DC: IEEE Computer Society, 2007:321-334. 被引量:1
  • 4BOLDYREVA A, GOYAL V, KUMAR V. Identity-based encryp- tion with efficient revocation[ C]// Proceedings of the ACM Confer- ence on Computer and Communications Security. New York: ACM Press, 2008:417-426. 被引量:1
  • 5IBILMMI L, PE'IOVIC M, NIKOVA S, et al. Mediated ciphertext- policy attribute-based encryption and its application[ C]// Proceedings of the lOth International Workshop on Information Security Applica- tions, LNCS 5932. Berlin:Springer-Verlag, 2009:309-323. 被引量:1
  • 6OSTROVSKY R, SAHAI A, WATERS B. Attribute-based encryp- tion with non-monotonic access structures[ C]// Proceedings of the ACM Conference on Computer and Communications Security. New York: ACM Press, 2007:195-203. 被引量:1
  • 7ATI'RAPADUNG N, IMAI H. Conjunctive broadcast and attribute- based encryption[ C]// Pairing 2009: Proceedings of the Pairing- Based Cryptography. Berlin: Springer-Verlag, 2009:248-265. 被引量:1
  • 8YU S C, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[ C]// Proceedings of the Asian ACM Con- ference on Computer and Communications Security. New York: ACM Press, 2010:261-270. 被引量:1
  • 9IBRAIMI L, TANG Q, HARTEL P, et al. Efficient and provable se- cure ciphertext-policy attribute-based encryption schemes[ C]//Pro- ceedings of the Information Security Practice and Experience. Ber- lin: Springer-Verlag, 2009: 1-12. 被引量:1

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/. 被引量:1
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home. 被引量:1
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org. 被引量:1
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7. 被引量:1
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396. 被引量:1
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]. 被引量:1
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf. 被引量:1
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009. 被引量:1
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009. 被引量:1

共引文献1068

同被引文献47

  • 1沈海波,洪帆.基于属性的授权和访问控制研究[J].计算机应用,2007,27(1):114-117. 被引量:16
  • 2SAHAI A,WATERS B.Fuzzy identity-based encryption[C]//Proc of Advances in Cryptology-EUROCRYPT.Berlin:Springer-Verlag,2005:457-473. 被引量:1
  • 3WATERS B.Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]//Proc of the 14th Interntional Comfernce on Practie and Theory inPublic Key Cryptography.Berlin:Springer,2011:53-70. 被引量:1
  • 4DAZA V,HERRANZ J,MORILLO P,et al.Extended access structures and their cryptographic applications[EB/OL].(2008-11-28).http://eprint.iacr.ong/2008/502.pdf. 被引量:1
  • 5EMURA K,MIYAJI A,NOMURA A,et al.A ciphertext-policy attribute-based encryption scheme with constant ciphertext length[C]//Proc of the 5th International Conference on Information Security Practice and Experience.Berlin:Springer,2009:13-23. 被引量:1
  • 6DOSHI N,JINWALA D.Constant ciphertext length in CP-ABE[EB/OL].2012.http://eprint.iacr.org/2012/500.pdf. 被引量:1
  • 7YU Shu-cheng,WANG Cong,REN Kui,et al.Attribute based data sharing with attribute revocation[C]// Proc of the 5th ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2010:261-270. 被引量:1
  • 8HERRANZ J,LAGUILLAUMIE F,RàFOLS C.Constant size ciphertexts in threshold attribute-based encryption[C]//Proc of the 13th International Conference on Practice and Theory in Public Key Cryptography.Berlin:Springer,2010:19-34. 被引量:1
  • 9徐鹏,金海,邹德清.加密数据云存储及其隐私保护[J].中国计算机学会通讯,2012,8(7):22-28. 被引量:1
  • 10FERRAIOLO D F, SANDHU R, GUIRILA S, et al. Proposed NIST standard for role-based access control [ J ]. ACM Trans on Informa- tion and System Security,2001,4(3) :224-274. 被引量:1

引证文献7

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部