期刊文献+

隐藏策略的可验证外包解密OO-CP-ABE访问控制方案 被引量:3

Verifiable Outsourced Decryption OO-CP-ABE Access Control Scheme with Hidden Policy
下载PDF
导出
摘要 在密文策略属性基加密(CP-ABE)中,数据加密和解密所需时间与访问结构的复杂性相关,在移动设备中实施CP-ABE会使设备面临较大的计算压力。为此,提出一种隐藏策略的可验证外包解密在线/离线密文策略属性基加密访问控制方案。考虑到加密阶段较大的计算量,通过在线/离线加密方法,使数据拥有者在未确定明文和访问结构的情况下,运用高性能服务器提前完成大量的计算操作,确定明文和属性后在其移动设备上通过较少的计算量完成整个加密过程,从而减轻移动设备在加密阶段的计算负担,同时使用代理服务器对数据进行解密,并引入短签名方法对解密的数据进行正确性验证。分析结果表明,该方案能够减轻移动设备的计算负担,并验证了代理服务器解密数据的正确性。 In Ciphertext-Policy Attribute-Based Encryption(CP-ABE),the time required for data encryption and decryption is related to the complexity of the access structure,so implementing CP-ABE in mobile devices makes the device under greater computational pressure.Therefore,this paper proposes a verifiable outsourced decryption Online/Offline Ciphertext-Policy Attribute-Based Encryption(OO-CP-ABE)access control scheme with hidden policy.Considering the large amount of computation in the encryption phase,through the online/offline encryption method,the data owner uses a high-performance server to complete a large number of computational operations ahead of time without determining the plaintext and access structure.After determining the plaintext and attributes,the entire encryption process is completed with less computation on its mobile device,thereby reducing the computational burden of the mobile device during the encryption phase.At the same time,the scheme uses a proxy server to decrypt the data and introduces a short signature method to verify the correctness of the decrypted data.Analysis results show that the scheme reduces the computational burden of the mobile device and verifies the correctness of data decrypted by the proxy server.
作者 迪力夏提·吾普尔 陈成 努尔买买提·黑力力 DILXAT Ghopur;CHEN Cheng;NURMAMAT Helil(School of Mathematics and System Science,Xinjiang University,Urumqi 830046,China)
出处 《计算机工程》 CAS CSCD 北大核心 2019年第10期166-170,共5页 Computer Engineering
基金 国家自然科学基金(61562085,61862059,11461069) 新疆维吾尔自治区人力资源和社会保障厅留学人员科技活动项目
关键词 密文策略属性基加密 在线/离线加密 外包解密 隐藏策略 移动设备 Ciphertext-Policy Attribute-Based Encryption(CP-ABE) online/offline encryption outsourced decryption hiding policy mobile device
  • 相关文献

参考文献5

二级参考文献27

  • 1YU S, WANG C, REN K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[A]. INFOCOM, 2010 Proceedings IEEE[C]. 2010. 1-9. 被引量:1
  • 2SAHAI A, WATERS B. Fuzzy Identity-Based Encryption[M]. Springer Berlin Heidelberg, 2005. 被引量:1
  • 3GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for free-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Secu- rity[C]. ACM, 2006.89-98. 被引量:1
  • 4BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attrib- ute-based encryption[A]. Security and Privacy[C]. 2007.321-334. 被引量:1
  • 5WATERS B. Ciphertext-Policy Attribute-Based Encryption: An Ex- pressive, Efficient, and Provably Secure Realization[M]. Springer Ber- lin Heidelberg, 2011. 被引量:1
  • 6CHASE M. Multi-Authority Attribute based Encryption[M]. Theory of Cryptography. Springer Berlin Heidelberg, 2007. 被引量:1
  • 7LEWKO A, WATERS B. Decentralizing Attribute-based Encryp- tion[M]. Springer Berlin Heidelberg, 2011. 被引量:1
  • 8LIU Z, CAO Z, HUANG Q, et al. Fully secure multi-authority cipher- text-policy attribute-based encryption without random oracles[A]. Computer Security-ESORICS 2011[C]. Springer Berlin Heidelberg, 20 l 1. 278-297. 被引量:1
  • 9SAHAI A, SEYALIOGLU H, WATERS B. Dynamic credentials and ciphertext delegation for attribute-based encryption[A]. Advances in Cryptology2RYPTO 2012[C]. Springer Berlin Heidelberg, 2012. 199-217. 被引量:1
  • 10YANG K, JIA X, PEN K, et al. Enabling efficient access control with dynamic policy updating for big dam in the cloudA. 1NFOCOM, 2014 Proceedings IEEE[C]. 2014. 2013-2021. 被引量:1

共引文献30

同被引文献27

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部