期刊文献+

自适应安全与属性可重复的多授权机构ABE方案 被引量:2

Adaptive Secure and Attribute Repeatable Multi-authority ABE Scheme
下载PDF
导出
摘要 现有多授权机构属性基加密(MA-ABE)方案限制每个属性在访问结构中只能出现一次,然而属性重复编码会导致系统效率较低。针对该问题,提出一种属性可重复的多授权机构密文策略属性基加密方案。通过引入qParallel BDHE假设,避免经典对偶系统加密证明时要求访问结构中属性不能重复出现的问题,从而验证该方案在标准模型下是自适应安全的。性能分析结果表明,当加密使用的访问结构中出现一次属性重复时,该方案密文长度和解密速度与现有MA-ABE方案相当,当出现多次属性重复时其解密速度更快。 Previous Multi-authority Attribute-based Encryption(MA-ABE)schemes limit each attribute to appear only once in the access structure,and suffer from superfluous computation overhead on repetitive encoding technique.To solve this problem,a attribute repeatable Multi-authority Ciphertext-policy ABE(MA-CP-ABE)scheme is proposed.The q-parallel Bilinear Diffie-Hellman Exponent(q-Parallel BDHE)assumption is introduced to solve the problem that classical dual system encryption requires each attribute to appear only once in the access structure,then this scheme is proven adaptive secure in the standard model.Performance analysis result indicates that the size of ciphertext and the pairing computation of decryption in this scheme is equal to previous MA-ABE scheme when one attributes are appear twice in the access structure,the decryption of this scheme is more efficient when more attributes repeated in the access structure.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第12期21-25,共5页 Computer Engineering
基金 国家"973"计划基金资助项目(2011CB311801)
关键词 属性基加密 多授权机构 属性可重复 自适应安全 标准模型 Attribute-based Encryption(ABE) multi-authority attribute repeatable adaptive secure standard model
  • 相关文献

参考文献19

  • 1Sahai A,Waters B. Fuzzy Identity-based Encryption [C]// Proceedings of Cryptology-EUROCRYPT' 05. Berlin, Germany : Springer-Verlag ,2005:457-473.
  • 2Goyal V, Pandey O, Sahai A, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data [ C ]//Proceedings of the 13 th ACM Conference on Computer and Communications Security. New York, USA : ACM Press ,2006 : 89-98.
  • 3Bethencourt J, Sahai A, Waters B. Ciphertext-policy Attribute-based Encryption [ C ]//Proceedings of 2007 IEEE Symposium on Security and Privacy. Washington D. C. , USA : IEEE Computer Society ,2007 : 321-334.
  • 4邓宇乔.基于动态属性的加密方案[J].计算机工程,2014,40(4):136-140. 被引量:7
  • 5林娟,薛庆水,曹珍富.基于代理的即时属性撤销KP-ABE方案[J].计算机工程,2014,40(10):20-24. 被引量:3
  • 6冯登国,陈成.属性密码学研究[J].密码学报,2014,1(1):1-12. 被引量:52
  • 7Chase M. Multi-authority Attribute Based Encryp- tion[C]//Proceedings of TCC ' 07. Berlin, Germany: Springer-Verlag, 2007 : 515-534.
  • 8Chase M,Chow S S M. Improving Privacy and Security in Multi-authority Attribute-based Encryption [ C ]// Proceedings of ACM Conference on Computer and Communications Security. New York, USA : ACM Press, 2009 : 121-130.
  • 9MOiler S, Katzenbeisser S, Eckert C. Distributed Attribute-based Encryption [ C ]//Proceedings of ICISC' 08. Berlin, Germany: Springer-Verlag ,2008 : 20-36.
  • 10M011er S,Katzenbeisser S, Eckert C. On Multi-authority Ciphertext-policy Attribute-based Encryption [ J ]. Bulletin of the Korean Mathematical Society,2009,46(4) :803-819.

二级参考文献38

  • 1Bethencourt J, Sahai A, Waters B. Ciphertext-policy Attribute- based Encryption[C]//Proc. of the 28th IEEE Symposium on Security and Privacy. Oakland, USA: [s. n.], 2007: 321-334.
  • 2Goyal V, Pandey O, Sahai A, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proc. of CCS'06. New York, USA: ACM Press, 2006: 89-98.
  • 3Sahai A, Waters B. Fuzzy Identity-based Encryption[C]//Proc. of EUROCRYPT'05. Aarhus, Denmark: Springer-Verlag, 2005: 457-473.
  • 4Cheung L. Provably Secure Ciphertext Policy ABE[C]//Proc. of ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2007: 456-465.
  • 5Goyal V, Jain A, Pandey O, et al. Bounded Ciphertext Policy Attribute-based Encryption[C]//Proc. of ICALP'08. Berlin, Germany: Springer-Verlag, 2008: 579-591.
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-policy Attribute- based Encryption[C]//Proc. of IEEE Symposium on Securityand Privacy. Pittsburgh, USA: [s. n.], 2007:321-334.
  • 7Pirretti M, Traynor P, McDaniel P, et al. Secure Attribute Based Systems(C]//Proc. of the 13th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2006:99-112.
  • 8Ostrovsky R, Sahai A, Waters B. Attribute Based Encryption with Non-monotonic Access Structures[C]//Proc. of ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2007: 195-203.
  • 9Lee B, Kim K. Fair Exchange of Digital Signatures Using Conditional Signature[C]//Proc. of Symposium on Cryptogra- phy and Information Security. Shiraharna, Japan: [s. n.], 2002: 179-184.
  • 10Marek K, Mirostaw K, Anna L. Conditional Digital Signa- tures[C]//Proc, of the 2nd International Conference on Trust, Privacy, and Security in Digital Business. Berlin, Germany: Springer-Verlag, 2005:206-215.

共引文献73

同被引文献11

引证文献2

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部