期刊文献+

多主密钥功能加密:基于LMSSS的M-KP-ABE方案 被引量:1

Multiple-Authority-Key Functional Encryption:A M-KP-ABE Scheme Based on LMSSS
下载PDF
导出
摘要 功能加密极大地拓宽了秘密信息的共享方式,但支持多主密钥功能性函数加密方案的构造问题仍未解决,多主密钥功能加密具有更强的表达能力和更广义的特性.在功能加密的一个子类密钥策略属性基加密上,首次提出了多主密钥形式的安全模型M-KP-ABE.利用线性多秘密共享方案,设计了该安全模型下的一个支持多主密钥功能性函数的加密方案.基于DBDH假设,在标准模型下证明方案在适应性选择挑战和自适应选择明文攻击下是安全的.该方案加密数据的访问策略更为灵活,可退化为单主密钥的加密方案,可构造具有精细访问树的方案,其计算量与单主密钥方案相等,具有较高的效率. Functional encryption opens up a much larger world of possibilities for sharing encrypted data. It is sufficient for many emerging applications. Some recent work aimed at constructing different types of fine-grained encryption systems which could be cast in the framework of functional encryption,such as IBE, ABE, PE, but they only focused on the systems that supported single- authority-key functionality. We extend functional encryption to multiple-authority-key functional encryption, which can provide more sophisticated and flexible functionality. This system allows an encryptor to specify a policy and a capability by describing what users can learn from the ciphertext. The policies are similar to what were defined in the previous systems and the capabilities are expressed as different kinds of authority keys. This paper gives a security model for a class of multiple- authority-key functional encryption, multiple-authority-key KP-ABE. A new KP-ABE scheme,which supports functionalities taken in multiple authority keys, is proposed in the given security model. Our techniques allow for any attribute access the structure expressed by a linear multi-secret sharing scheme (LMSSS) matrix M. Based on the assumption of DBDH, this scheme is proven to be selectively secure in the standard model under chosen plaintext attack, tt is easy to derive the single- authority-key scheme from the multiple-authority-key scheme and construct fine-grained tree-access structure. The computational cost of our scheme is equal to the single-authority-key scheme, which makes it more appropriate in many practical applications.
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第8期1363-1369,共7页 Journal of Computer Research and Development
基金 国家自然科学基金重点项目(60633020) 国家自然科学基金项目(60573036) 武警工程学院基础基金项目(WJY201119)
关键词 密钥策略属性基加密 线性多秘密共享方案 功能加密 功能性函数 双线性对 KP-ABE LMSSS functional encryption functionality bilinear pairings
  • 相关文献

参考文献15

  • 1Lewko A functional Sahai A, et al. Fully secure encryption : Attribute-based encryption (hierarchical) inner product encryption [G] //LNCS Proc of EUROCRYPT 2010. Berlin: Springer, 2010: and 6110: 62-91.
  • 25oneh D, 5ahal A, Waters B. Functional encryption: Definitions and challenges[G] //LNCS 6597: Proc of TCC 2011. Berlin: Springer, 2011:253-273.
  • 3Shamir A. Identity based cryptosystems and signature schemes[G] //LNCS 196: Proc of CRYPTO 1984. Berlin.. Springer, 1984: 47-53.
  • 4Boneh D, Franklin M. Identity based encryption from the Weil pairing[G] //LNCS 2139: Proc of CRYPT() 2001. Berlin: Springer, 2001:213-229.
  • 5Cocks C. An identity based encryption scheme based on quadratic residues[C] //Proc of the 8th IMA Int Conf on Cryptography and Coding 2011. Berlin:Spritlger, 2001: 360-363.
  • 6Sahai A, Waters B. Fuzzy identity based encryption[C] // Proc of EUROCRYPT 2005. Berlin: Springer, 2005: 457- 473.
  • 7Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine grained access control of encrypted data [C] //Procof ACM CCS 2006. New York:ACM,2006: 89- 98.
  • 8Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures[C] //Proc of ACM CCS 2007. New York: ACM, 2007:195-203.
  • 9唐强,姬东耀.多授权中心可验证的基于属性的加密方案[J].武汉大学学报(理学版),2008,54(5):607-610. 被引量:8
  • 10Waters B. Ciphertext-poliey attribute-based eneryption: An expressive, efficient, and provably secure realization [G]// LNCS6571: ProcofPKC2011. Berlin: Springer, 2011: 53- 70.

二级参考文献15

  • 1[1]Blackley, G. R., Safeguarding cryptographic keys, Proc. of the 1979 AFIPS National Computer Conference,1979, 48: 313-317.
  • 2[2]Shamir, A., How to share a secret, Communications of the ACM, 1979, 22: 612-613.
  • 3[3]Blundo, C., De Santis, A., Di Crescenzo, G., Multi-secret sharing schemes, Advances in Cryptology-CRYPTO'94,1995, 839: 150-163.
  • 4[4]Beimel, A., Secure Schemes for Secret Sharing and Key Distribution, PhD thesis, Technion-Israel Institute of Techonlogy, 1996.
  • 5[5]Blundo, C., De Santis, A., Masucci, B., Randomness in Multi-Secret Sharing Schemes, Technical Report, University of Salerno, 1998.
  • 6Shamir A. Identity-Based Cryptosystems and Signature Schemes [DB/OL]. [2007-11-03]. http://www. iseca, org/downloads/Stzamir47, pd f .
  • 7Boneh D,Franklin M. Identity-Based Encryption from the Well Pairing[J]. SIAM Journal of Computing, 2003,32:586-615.
  • 8Sahai A, Waters B. Fuzzy Identity-Based Encryption [DB/OL]. [2007-11-03]. http://www. springerlink. corn/content/kOvdgacqjq4jyypgrn/ fulltecrt, pd f.
  • 9Bonaloh J, Leieheter J. Generalized Secret Sharing and Monotone Functions [DB/OL]. [2007-11-03]. http ://cornell, edu/ courses/ cs7 5 4 / 2001f a / bena88. pdf.
  • 10Goyal V, Pandey O, Sahai A, et al. Attribute-Based Eneryption for Fine-Grained Access Control of Encrypted Data[DB/OL]. [2007-11-15]. http://portal. acre. org/ ft gateway, c fro? id= 1180418 &type= pdf&coll = GUIDE&dl : GUIDE&CFID = 371985- 78&CFTOKEN=84478665.

共引文献14

同被引文献8

  • 1Bethencourt J,Sahai A,Waters B.Ciphertext-Policy Attribute-Based Encryption. Proceedings of the28th IEEE Sympo-sium on Securityand Privacy . 2007
  • 2FREEMAN D M.Converting pairing-based cryptosystems from compo-site-order groups to prime-order group. Proc of the29th Interna-tional Conference on the Theory and Application of Cryptographic Techniques . 2010
  • 3GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryptionfor fine-grained access control of encrypted data. The 13th ACMConference on Computer and Communications Security ACM . 2006
  • 4OSTROVSKY R,SAHAI A,WATERS B.Attribute-based encryptionwith non-monotonic access structures. The 14th ACM Conferenceon Computer and Communications Security ACM . 2007
  • 5WATERS B.Ciphertext-policy attribute-based encryption:An expres-sive,efficient,and provably secure realization. http://eprint.iacr.org/ . 2008
  • 6LEWKO A,OKAMOTO T,SAHAI A,et al.Fully secure functionalencryption:Attribute-based encryption and (hierarchical)inner productencryption. Advances in Cryptology-EUROCRYPT 2010 . 2010
  • 7LEWKO A.Tools for simulating features of composite order bilineargroups in the prime order setting. Cryptology ePrint Archive,Report 2011/490 . 2011
  • 8BEIMEL A.Secure Schemes for Secret Sharing and Key Distribution. . 1996

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部