期刊文献+

隐藏访问结构的基于属性加密方案 被引量:19

Attribute-based Encryption with Hidden Access Structures
下载PDF
导出
摘要 该文利用双系统密码技术在素数群中提出了一个具有隐藏访问结构功能的基于属性加密方案。该方案的安全性依赖于D-Linear假设和DBDH(Decision Bilinear Diffie-Hellman)假设,并且在标准模型下证明是完全安全的。同时,方案中用户私钥长度和解密过程中双线性对的运算量都为固定值,适用于存储量和计算量小的系统。 Using dual system encryption,a attribute-based encryption scheme with hidden access structures is proposed in prime order bilinear group in this paper.The scheme relies on the D-Linear and Decision Bilinear Diffie-Hellman(DBDH) assumptions,and is proven fully secure under standard model.Moreover,it is suitable for the system with lower storage devices and higher efficiency computations because it achieves constant size private key and constant length of pairing computations.
出处 《电子与信息学报》 EI CSCD 北大核心 2012年第2期457-461,共5页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60833008) 信息安全国家重点实验室开放课题基金(01-02-8) 全军军事学研究生课题资助项目
关键词 基于属性的加密 隐藏访问结构 完全安全 双线性对 Attribute-based encryption Hidden access structures Fully secure Bilinear pairing
  • 相关文献

参考文献10

  • 1Sahai A and Waters B. Fuzzy identity-based encryption[C]. In EUROCRYPT 2005, 2005, LNCS 3494: 457-473.
  • 2Goyal V, Pandey O, Sahai A, et al.. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, New York, USA, 2006: 89-98.
  • 3Herranz J, Laguillaumie F, and Rafols C. Constant size ciphertexts in threshold attribute-based encryption[C]. In PKC 2010, 2010, LNCS 6065: 19-34.
  • 4Waters B. Ciphertext-policy attribute-based encryption: anexpressive, efficient, and provably secure realization[C]. In PKC 2011, 2011, LNCS 6571: 53-70.
  • 5Attrapadung N, Libert B, and Panafieu E. Expressive key-policy attribute-based encryption with constant-size ciphertexts[C]. In PKC 2011, 2011, LNCS 6571: 90-108.
  • 6Nishide T, Yoneyama K, and Ohta K. Attribute-based encryption with partially hidden encryptor-specified access structures[C]. In ACNS 2008, 2008, LNCS 5037: 111-129.
  • 7Lai J, Deng R H, and Li Y. Fully secure cipertext-policy hiding CP-ABE[C]. In ISPEC 2011, 2011, LNCS 6672: 24-39.
  • 8Freeman D M. Converting pairing-based cryptosystems from composite-order groups to prime-order groups[C]. In EUROCRYPT 2010, 2010, LNCS 6110: 44-61.
  • 9Lewko A and Waters B. New techniques for dual system encryption and fully secure HIBE with short ciphertexts [EB/OL]. http://eprint.iracr.org/2009/482, 2009.
  • 10Waters B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions[C]. In CRYPTO 2009, 2009, LNCS 5677: 619-636.

同被引文献108

  • 1刘西蒙,马建峰,熊金波,马骏,李琦.基于属性的可净化签名方案[J].通信学报,2013,34(S1):148-155. 被引量:4
  • 2杨浩淼,孙世新,李洪伟.双线性Diffie-Hellman问题研究[J].四川大学学报(工程科学版),2006,38(2):137-140. 被引量:12
  • 3Sahai A, Waters B. Fuzzy Identity-based Encryption[C]//Proceeding of EUROCRYPT'05. Berlin: Springer, 2005: 457-473.
  • 4Waters B. Efficient Identity-based Encryption without Random Oracles [C]//Proceedings of EUROCRYPT'05. Berlin: Springer, 2005: 114-127.
  • 5Waters B. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions [C]//Proceedings of CRYPTO'09. Berlin: Springer, 2009: 619-636.
  • 6Goyal V, Pandey O, Sahai A, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-policy Attribute-based Encryption[C]//Proceeding of the 2007 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2007: 321-334.
  • 8Cheung L, Newport C. Provably Secure Ciphertext Policy ABE [C]//Proceeding of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 456-465.
  • 9Waters B. Ciphertext-policy Attribute-based Encryption: an Expressive, Efficient, and Provably Secure Realization[C]// Proceedings of PKC 2011 Computer Science. Berlin: Springer, 2011: 53-70.
  • 10Okamoto T, Takashima K. Fully Secure Unbounded Inner-product and Attribute-based Encryption[C]//Proceedings of ASIACRYPT'12. Berlin: Springer, 2012: 349-366.

引证文献19

二级引证文献107

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部