期刊文献+

一种多认证机构可验证的属性基加密方案 被引量:3

Verifiable attribute base encryption scheme with multi-authority
下载PDF
导出
摘要 针对属性基加密中中央认证机构所带来的安全隐患问题,提出了一种新型的多认证机构可验证的属性基加密方案。该方案采用由各个认证机构独立生成系统主私钥份额和各自公私钥的方法,去除了中央认证机构,避免了因中央认证机构一旦遭破坏将会导致整个系统崩溃的问题,提高了属性基加密的安全性,同时对密文和密钥的正确性进行了验证。最后,给出了可验证性和安全性分析。 Aiming at the security issues caused by the central authority in attribute base encryption,this paper proposed a noble multi-authority verifiable attribute base encryption scheme.Compared with other schemes,the central authority was omitted in this scheme which solved the problem that the whole system would crash once the central authority was destroyed,using the technology of making each authority to generate their own master keys parts as well as their public and private keys independently.So the security of the system was improved.At the same time,it verified the correctness of the ciphertext and the keys.In addition,it gave the verification and security analysis.
出处 《计算机应用研究》 CSCD 北大核心 2012年第1期308-311,共4页 Application Research of Computers
基金 浙江省自然科学基金资助项目(Y1110781)
关键词 属性基加密 多认证机构 无中央认证机构 可验证性 安全性 attribute based encryption multi-authority without a central authority verifiability security
  • 相关文献

参考文献9

  • 1SAHAI A, WATERS B. Fuzzy identity-based encryption[ C ]//Advances in Cryptology-EUROCRYPT 2005. Berlin: Springer-Verlag, 2005 : 457-473.
  • 2GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data [ C ]//Proc of ACM Conference on Computer and Communications Security. New York : ACM Press, 2006:89-98.
  • 3BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption [ C ]//Proc of IEEE Symposium on Security and Privacy. Oakland:IEEE Computer Society, 2007: 321-334.
  • 4WATERS B. Ciphertext-policy attribute-based encryption:an expressive, efficient, and provably secure realization [ C ]//Proc of Public Key Cryptography-PKC 2011. New York: Springer-Verlag, 2011 : 53- 70.
  • 5ATTRAPADUNG N, IMAI H. Dual-policy attribute based encryption [C]//Proc of Applied Cryptography and Network Security Conference. Berlin : Springer-Verlag, 2009 : 168-185.
  • 6CHASE M. Multi-authority attribute based encryption [ C ]//Proc of Theory of Cryptography. Berlin: Springer-Verlag, 2007:515-534.
  • 7LIN Huang, CAO Zhen-fu, LIANG Xiao-hui, et al. Secure threshold multi-authority attribute based encry ption without a central authority [ C ]//Proc of Cryptology in India-INDOCRYPT 2008. Berlin : Springer-Verlag, 2008:426-436.
  • 8CHASE M, CHOW S S M. Improving privacy and security in multiauthority attribute-based encryption [ C]//Proc of the ACM Conference on Computer and Communications Security. New York: ACM Press, 2009 : 121 - 130.
  • 9TANG Qiang, JI Dong-yao. Verifiable attribute based encryption[J]. International Journal of Network Security,2010,10 (2) : 114-120.

同被引文献35

  • 1Hur J, Noh D K. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(7).
  • 2Yang Ming. An Efficient Attribute based Encryption Scheme with Revocation for Outsoureed Data Sharing Control[C]//2011 International Conference on Instrumentation, Measurement& Computer, Communication and Control. 2011.
  • 3Jia Hong-yong. Efficient and Scalable Multieast Key Manage- ment Using Attribute Based Eneryption[C] // 2010 International Conference on Information Theory and Information Security. 2010.
  • 4Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing[J]. Journal of Network and Computer Applications, 2011,34.
  • 5Liu Yu-ehao. A Method for Trust Management in Cloud Com- putingData Coloring by Cloud Watermarking[J]. Intemational Journal of Automation and Computing, 2011,8(3).
  • 6Sakr S, Liu A. A Survey of Large Scale Data Management Ap- proaches in Cloud Enviromnents[J]. IEEE Communications Sur- veys Tutorials,2011,13(3).
  • 7Yu Shu-eheng, Wang Cong. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing [C]// IEEE INFOCOM. 2010.
  • 8Zissis D, Lekkas D. Addressing cloud computing security issues [J]. Future Generation Computer Systems, 2012,28(3).
  • 9Hay B, Nanee K, Bishop M. Storm Clouds Rising: Security Chal- lenges for IaaS Cloud Computing[C]//'Proceedings of the 44th Hawaii International Conference on System Sciences. 2011.
  • 10Rodero-Merino L. Building safe PaaS elouds;A survey on securi- ty in multitenant software platforms[J]. Computers Security, 2012,31.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部