期刊文献+

基于属性的签密方案 被引量:3

Attribute-based Signcryption Scheme
原文传递
导出
摘要 现实生活中存在这样一种情况:具有某些属性的群组中的一个成员,他将上传一些签过名的敏感数据到第三方网站,并希望只能被具有特定属性的群组访问。为满足此需求,文章定义了基于属性的签密方案,其中,文件由属性集标识,私钥由一个访问控制结构产生,用来控制解密权限。最后,给出了方案的正确性证明和安全性分析。 In real life, existing thus situation, one belongs to a group with some attributes wants to upload sensitive data with his signature to a third-party website, and wants the data can be shared by one belongs to the group possessing specific attributes. To satisfy these needs, we defined an Attribute-based signcryption scheme. In our scheme, the ciphertexts are labeled with sets of attributes, the private keys are associated with access structures that control which texts a user is able to sign or decrypt. Finally, we give the correctness and security analysis of the scheme.
出处 《信息安全与通信保密》 2009年第9期129-131,共3页 Information Security and Communications Privacy
关键词 签密 基于属性的密码体制 双线性配对 拉格朗日插值 可证明安全 Signcryption Attribute-based Cryptosystem Bilinear Pairing Lagrange Interpolation Provable Security
  • 相关文献

参考文献5

  • 1Goyal V, Pandeyy O, Sahaiz A, et al. Attributebased encryption for fine grained access control of encrypted data[C]. In Proceedings of the 13th ACM Conference on Computer and Communications Security, New York: ACM, 2006: 89-98.
  • 2Guo Shanqing, Zeng Yingpei. Attribute based Signature Scheme[C]. In 2008 International Conference on Information Security and Assurance, BUSAN: Information Security and Assurance, 2008:509-511.
  • 3Khader D. Attribute Based Group Signatures[DB/ OL]. [2009-03-02]. http: //eprint.iacr.org/.
  • 4Pirretti M, Traynor P, McDaniel P, et al. Secure Atrribute-Based Systems[C]. In ACM conference on Computer and Communications Security(ACM CCS), New York: ACM, 2006: 99-112.
  • 5Hess F. Efficient identity based signature schemes based on pairings[C]. Berlin: Springer, 2003: 310- 324.

同被引文献20

  • 1杨晓元,林志强,韩益亮.高效的模糊属性基签密方案[J].通信学报,2013,34(S1):8-13. 被引量:3
  • 2MAMBO M, USUDA K, OKAMOTO E. Proxy Signature: Delegation of the Power to Sign Messages[J]. IEICE Trans. Fundamentals, 1996(E79-A):1338- 1353.
  • 3GOYAL V, PANDEYY O, SAHAIZ A. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]. USA: ACM Press, 2006:89-98.
  • 4GUO S O, ZENG Y P. Attribute-based Signature Scheme[C]. USA: IEgg Computer Society, 2008:509-511.
  • 5FLORIAN Hess. Efficient Identity Based Signature Schemes Based on Pairings [C]. Berlin/Heidelberg: Springer, 2003:310-324.
  • 6Bao F, Deng R. A signcryption scheme with signature directly ver- ifiable by public key [ M ]/! Public Key Cryptography, Japan: Springer Berlin Heidelberg, 1998 : 55 - 59.
  • 7Boyen X. Multipurpose Identity-Based Signcryption[ M l// Ad- vances in Cryptology-CRYPTO 2003, California, USA : Springer Berlin Heidelberg, 2003:383 - 399.
  • 8Sahai A, Waters B. Fuzzy Identity-Based Encryption [ M ]// Ad- vances in Cryptology - EUROCRYPT 2005, Aarhus, Denmark : Springer Berlin Heidelberg, 2005:457 - 473.
  • 9Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-graizled access control of encrypted data [ C ]. Proceedillgs of the 13th ACM conference on Computer and communications se- curity. New York : ACM, 2006:89 - 98.
  • 10Bethencourt J, Sahai A, Waters B. Ciphertext-Policy Attribute- Based Encryption[ C ]. IEEE Sympositlm on Security and Privacy, Oakland, California, USA: IEEE, 2007:321-334.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部