期刊文献+

前向安全的密文策略基于属性加密方案 被引量:13

Forward-secure ciphertext-policy attribute-based encryption scheme
下载PDF
导出
摘要 为降低密文策略基于属性加密(CP-ABE,ciphertext-policy attribute-based encryption)体制中私钥泄漏带来的损害,首先给出了前向安全CP-ABE体制的形式化定义和安全模型,然后构造了一个前向安全的CP-ABE方案。基于判定性l-BDHE假设,给出了所提方案在标准模型下的安全性证明。从效率和安全性2个方面讨论了所提方案的性能,表明所提方案在增强CP-ABE体制安全性的同时,并没有过多地增加计算开销和存储开销,更适合在实际中应用。 To mitigate the damage of key exposure in the context of ciphertext-policy attribute-based encryption (CP-ABE). The syntax and security model of forward-secure CP-ABE was presented. Then, a concreted forward-secure CP-ABE scheme was constructed. Under the I-BDHE assumption, the proposed scheme was proved secure in the stan- dard model. Furthermore, the performance of the proposed scheme was discussed in terms of security and efficiency. The results demonstrate that the proposed scheme strengthens the security of CP-ABE, without getting overmuch cost of computation and storage, and thus is more feasible for practical applications.
出处 《通信学报》 EI CSCD 北大核心 2014年第7期38-45,共8页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2012CB315905 2012CB315901) 中国博士后基金资助项目(2014M552524)~~
关键词 前向安全 私钥泄漏 基于属性加密 可证明安全 forward-secure key exposure attribute-based encryption provable security
  • 相关文献

参考文献21

  • 1SAHAIA,WATERS B.Fuzzy identity based encryption[A].Proc of the Eurocrypt 2005[C].Heidelberg:Springer-Verlag,2005.457-473. 被引量:1
  • 2GOYAL V,PANDEY O,et al.Attribute-based eneryption for free-grained access control of encrypted data[A].Proc of the 13th ACM CCS[C].New York,2006.89-98. 被引量:1
  • 3WATERS B.Ciphertext-policy attribute based encryption:an expres-sive,efficient and provably secure realization[A].Proc of the PKC 2011 [C].Heidelberg:Springer-Verlag,2011.53-70. 被引量:1
  • 4CHASE M.Multi-authority attribute based encryption[A].Proc of the TCC 2007[C].Heidelberg:Springer-Verlag,2007.515-534. 被引量:1
  • 5CHASE M,CHOW S.Improving privacy and security in multi-authority attribute-based encryption[A].Proc of the 16thACMCCS[C].New York,2009.121-130. 被引量:1
  • 6LEWKO A,WATERS B.Decentralizing attribute-based encryption[A].Proc of the Eurocrypt 2011[C].Heidelberg:Springer-Verlag,2011.568-588. 被引量:1
  • 7LEWKO A,WATERS B.New proof methods for attribute-based en-cryption:achieving full security through selective techniques[A].Proc of the Crypto 2012[C].Heidelberg:Springer-Verlag,2012.180-198. 被引量:1
  • 8HOHENBERGER S,et al.Attribute based encryptiun:with fast de-cryption[A].Proc of the PKC 2013[C].Heidelberg:Springer-Verlag,2013.162-179. 被引量:1
  • 9ANDERSON R.Two Remarks on Public Key Cryptology[R].Invited Lecture at the 4th ACM Conference on Computer and Communica-tions Security,1997. 被引量:1
  • 10BELLARE M,MINER S K.A forward-secure digital signature scheme[A].Proc of the Crypto 1999[C].Heidelberg:Springer-Verlag,1999.431-448. 被引量:1

同被引文献114

  • 1郭远,徐赐文.基于ElGamal的前向安全签名方案的分析与改进[J].电脑知识与技术(过刊),2009,0(6):1459-1460. 被引量:2
  • 2夏峰,谢冬青,匡华清.一类前向安全数字签名方案的分析与改进[J].计算机工程,2006,32(16):146-147. 被引量:4
  • 3SAHAI A,WATERS B.Fuzzy identity based encryption[C]//Proceedings of 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer-Verlag,2005:457-473. 被引量:1
  • 4GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York:ACM,2006:89-98. 被引量:1
  • 5TANG Y,LEE P,LIU J,et al.Secure overlay cloud storage with access control and assured deletion[J].IEEE Transactions on Dependable and Secure Computing,2012,9(6):903-916. 被引量:1
  • 6洪澄,张敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展,2010,47(Z1):259-265. 被引量:4
  • 7YU S,WANG C,REN K,et al.Achieving secure,scalable and fine-grained data access control in cloud computing[C]//Proceedings of the 2010 INFOCOM.Piscataway:IEEE,2010:1-9. 被引量:1
  • 8HUR J,NOH D K.Attribute-based access control with efficient revocation in data outsourcing systems[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(7):1214-1221. 被引量:1
  • 9ATTRAPADUNG N,IMAI H.Conjunctive broadcast and attribute-based encryption[C]//Proceedings of the Third International Conference on Pairing-Based Cryptography - Pairing 2009,LNCS 5671.Berlin:Springer,2009:248-265. 被引量:1
  • 10WAN Z,LIU J,DENG R H.HASBE:a hierarchical attribute-based solution for flexible and scalable access control in cloud computing[J].IEEE Transactions on Information Forensics and Security,2012,7(2):743-754. 被引量:1

引证文献13

二级引证文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部