期刊文献+

一种适合云数据共享的身份代理重加密方案 被引量:5

Identity based proxy re-encryption scheme for secure cloud data sharing
下载PDF
导出
摘要 目前云数据安全存储方案中,数据拥有者加密数据上传到云中,但却不能很好地支持加密数据分享,尤其是分享给多个用户时,可扩展性不强。针对这个问题提出一种基于身份的代理重加密方案,该方案不需要云完全可信但却又能灵活地进行数据安全共享。在具体构造上,结合基于身份的加密,用一个强不可伪造的一次签名方案使被转换后的密文具有公开验证性,且能达到被转换后的密文在标准模型下具有选择密文安全性。由于该类方案无须使用公钥证书、能支持细粒度的访问控制且可扩展性较好,因此可以较好地适用于安全云数据共享。 Currently most of the solutions of cloud data security storage required the data owner encrypted his data before out- sourcing the data to the cloud, but this method couldn't support flexible data sharing, especially for the multi-user setting. Aimed at solving this problem, this paper proposed a new identity based proxy re-encryption scheme, which didn't need the cloud to be completely trusted, but could also be used to share the data safely. In the concrete construction, this paper used a strongly non-forgeable signature scheme to let the encrypted ciphertexts be publicly verifiable, this scheme could also be cho- sen ciphertext secure in the standard model. For the proposed scheme can be used without certificate, support fine-grained ac- cess control and be very scalable, thus it can be used for secure data sharing in the cloud.
出处 《计算机应用研究》 CSCD 北大核心 2016年第11期3450-3454,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61379152) 陕西省自然科学基金资助项目(2014JM8300)
关键词 云存储安全 数据共享 代理重加密 标准模型 可公开验证 cloud storage secure data sharing proxy re-encryption standard model publicly verifiable
  • 相关文献

参考文献14

  • 1谢琪,刘文浩,韩立东.云计算数据安全及隐私保护[c]//中国密码学会组编.中国密码学发展报告2012.北京:电子工业出版社,2014:161—174. 被引量:1
  • 2郎讯,魏立线,王绪安,吴旭光.基于代理重加密的云存储密文访问控制方案[J].计算机应用,2014,34(3):724-727. 被引量:10
  • 3洪澄,张敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展,2010,47(z1):259-265. 被引量:1
  • 4洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方法[J].通信学报,2011,32(7):125-132. 被引量:79
  • 5吕志泉,张敏,冯登国.云存储密文访问控制方案[J].计算机科学与探索,2011,5(9):835-844. 被引量:34
  • 6Vipul G, Abhishek J, Omkant P, et al. Bounded ciphertext policy attribute based encryption [ C ]//Proc of ICALP. 2008 : 579- 591. 被引量:1
  • 7Wang G, Liu Q, Wu J, et al. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers [ J ]. Computers & Security, 2011,30(5) : 320-331. 被引量:1
  • 8Ateniese G, Bums R, Curtmola R. Provable data possession at un- trusted stores [ C]//Proc of the 14th ACM Conference on Computer and Communications Security. New York : ACM Press, 2007 : 598- 609. 被引量:1
  • 9邵俊..代理重密码的研究[D].上海交通大学,2007:
  • 10Canetti R, Halevi S, Katz J. Chosen-ciphertext security from identity- based encryption [ C ]//Proc of the 24th Annual International Cryptol- ogy Conference on Advances in Cryptology. Berlin: Springer, 2004: 207- 222. 被引量:1

二级参考文献37

  • 1Dignan L. Cloud computing hasn't gone fortune 500 yet, but it's coming[EB/OL]. [2011-04]. http://blogs.zdnet.com/ BTL/?p=8199. 被引量:1
  • 2Shamir A. Identity-based cryptosystems and signature schemes[C]//LNCS 196: Proceedings of the Advances in Cryptology (CRYPTO), 1985. Berlin, Heidelberg: Springer- Verlag, 1985: 47-53. 被引量:1
  • 3Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Proceedings of the Advances in Cryptology (CRYPTO), 2001. Berlin, Heidelberg: Springer- Veflag, 2001: 213-229. 被引量:1
  • 4Sahai A, Waters B. Fuzzy identity based encryption[C]// Proceedings of the Advances in Cryptology (EUROCRYPT), Aarhus, Denmark, 2005. Berlin, Heidelberg: Springer- Verlag, 2005: 457--473. 被引量:1
  • 5Goyal V, Pandey O, Sahai A, et al. Attribute based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). New York, NY, USA: ACM, 2006: 89-98. 被引量:1
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, California, USA, 2007. Washington, DC, USA: IEEE Computer Society, 2007: 321-334. 被引量:1
  • 7Liang Xiaohui, Cao Zhenfu, Lin Huang, et al. Attribute based proxy re-encryption with delegating capabilities[C]//Proceedings of the 4th International Symposium on Information, Computer and Communications Security (ASIACCS 2009). New York, NY, USA: ACM, 2009: 276-286. 被引量:1
  • 8Hong Cheng, Zhang Min, Feng Dengguo. AB-ACCS: a cryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development, 2010, 47(Suppl): 259-265. 被引量:1
  • 9Pirretti M, Traynor P, McDaniel P, et al. Secure atrribute-based systems[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). New York, NY, USA" ACM, 2006: 99-112. 被引量:1
  • 10Yu Shucheng, Wang Cong, Ren Kui, et al. Attribute based data sharing with attribute revocation[C]//Proceedings of the 5th International Symposium on Information, Computer and Communications Security (ASIACCS 2010). New York, NY, USA: ACM, 2010: 261-270. 被引量:1

共引文献106

同被引文献32

引证文献5

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部