期刊文献+

支持撤销的位置分层属性加密研究 被引量:2

Research on encryption of location hierarchical attributes supporting revocation
下载PDF
导出
摘要 基于属性加密的位置分层访问方案允许用户依据自身情况灵活设置自己的位置访问信息,不仅解决了社交网络中位置共享问题,还在算法上进行改进使解密效率得以提升。但在系统运行过程中,存在用户有更正自己属性信息的需求或运行过程中部分私钥遭泄露的可能,因此支持撤销对于系统安全非常必要。基于此提出了一种支持撤销的位置分层属性加密方案,将部分解密运算外包给解密服务器,并结合了双因子身份认证的方法。该方案在减少用户计算代价的同时,提高了算法的安全性。 The location-based hierarchical access scheme based on attribute encryption allows users to flexibly set their own location access information according to their own situation.Not only solving the problem of location sharing in social networks,but also improving the algorithm to improve the decryption efficiency.However,during the operation of the system,there is a possibility that the user has corrected his own attribute information or the private key may be leaked during the operation,supporting the withdrawal is very necessary for system security.Based on this,this paper proposed a location hierarchical attribute encryption scheme supporting undo,which outsourced part of the decryption operation to the decryption server and combined the method of two-factor identity authentication.This solution reduces the user’s computational cost and improves the security of the algorithm.
作者 沈学利 崔海韵 陈鑫彤 Shen Xueli;Cui Haiyun;Chen Xintong(School of Electronics&Information Engineering,Liaoning Technical University,Huludao Liaoning 125105,China)
出处 《计算机应用研究》 CSCD 北大核心 2020年第1期216-220,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61602227).
关键词 属性加密 撤销 位置分层 解密外包 双因子身份认证 attribute encryption revocation location hierarchical outsourced decryption two-factor authentication
  • 相关文献

参考文献5

二级参考文献35

  • 1Sahai A, Waters B. Fuzzy identity-based encryption [CJ II Proc of Advances in Cryptology-EUROCRYPT.05,2005: 457-473.
  • 2BethencourtJ, Sahai A, Waters B. Ciphertext-policyattrib-ute-based encryption] CJ II Proc of IEEE Symposium on Secu-rity and Privacy, IEEE Computer Society, 2007 :321-334.
  • 3Ostrovsky R, Sahai A, Waters B. Attribute-Based encryp-tion with non-monotonic access structuresj C'] II Proc of the ACM Conference on Computer and Communications Securi-ty, 2007: 195-203.
  • 4Ibraimi L, Petkovic M, Nikova S, et al. Mediated cipher-text-policy attribute-based encryption and its application[CJ IIProc of the 10th International Workshop on Information Security Applications, 2009: 309-323.
  • 5Yu S C, Wang C, Ren K, et al. Attribute based data sharing with attribute revocation [CJ II Proc of the ASIAN ACM Conference on Computer and Communications Security, 2010:261-270.
  • 6Attrapadung N, Imai H. Attribute-based encryption support-ing direct/indirect revocation modes], CJ II Proc of the Cryp-tography and Coding, 2009:278-300.
  • 7Ibraimi L, Petkovic M, Nikova S, et al. Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes[EB/OLJ. [2009-08-10]. ht-tp://purl. utwente. nl/publications/65471.
  • 8Mell P, Grance T. The NIST Definition of Cloud Computing [S]. Gaithersburg, USA: National Institute of Standards and Technology, 2011.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [C]// Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P'07). Oakland, USA: IEEE Computer Society, 2007: 321-334.
  • 10Waters B. Ciphertext-policy attribute based encryption: An expressive, efficient, and provably secure realization [C]//Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography (PKC 2011). Heidelberg, Germany: Springer, 2011: 53-70.

共引文献50

同被引文献4

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部