期刊文献+

一种无需全局ID抗共谋攻击的属性加密算法及其在传感器网络中的应用 被引量:1

Free Global ID Against Collusion Attack on Attribute-based Encryption for Sensor Networks
下载PDF
导出
摘要 针对多中心基于属性的加密(attribute-based encryption,ABE)算法容易遭受共谋攻击的问题,首先根据用户属性与解密阈值之间的关系,将用户请求密钥的行为形式化地分为合法和共谋行为,然后提出了第一个无需全局ID(global ID,GID)的ABE算法。该算法要求每个属性中心在一个可信中心的配合下对用户请求进行安全检查,使得只有合法用户才能解密消息,而共谋者则无法解密。安全分析和实验结果表明,作者提出的算法不仅能够保护用户隐私不被泄露,而且没有明显增加传感器节点的通信开销和数据传输时延。 In order to solve the problem that multi-authority attribute-based encryption(ABE) is vulnerable to collusion attack,firstly,user behaviours of making request for key were formulized into legality and collusion according to the relationship between user's attribute and decryption threshold.Furthermore,a free Global ID(GID) ABE algorithm was proposed,where each attribute authority is required to run a security check for users'requests with the help of a trusted central authority,so that only legal user has power to decrypt message instead of colluders.The results of security analysis and performance evaluation showed that the proposed algorithm not only improves user's privacy,but also doesn't evidently increase communication overhead incurred by the node and the delay of transmitting node in wireless sensor networks(WSNs),and it is suitable for WSNs.
作者 高昂 李增智
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2012年第5期115-120,共6页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(60873262) 国家高技术研究发展计划资助项目(2007AA01Z180)
关键词 基于属性的加密 共谋攻击 无GID 隐私保护 无线传感器网络 attribute-based encryption collusion attack free GID privacy protection WSNs
  • 相关文献

参考文献8

  • 1Shamira A. Identity-based cryptosystems and signature schemes[ C ]//Proceedings of the 4th Annual International Cryptology Conference on Advances in Cryptology. Berlin, Germany : Springer-Verlag, 1985:47 - 53.
  • 2Sahai A,Waters B R. Fuzzy identity-based encryption[ C ]// Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Germany : Springer,2005:457 - 471.
  • 3Goyal V, Pandey O, Sahai A, et al. Attribute-based encryp- tion for fine-grained access control of encrypted data[ C ]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2006:89 - 98.
  • 4Chase M, Chow S S M. Improving privacy and security in multi-authority attribute-based encryption [ C ]//Proceed- ings of the 16th ACM Conference on Computer and Com- munications Security. New York, NY, USA : ACM, 2009 : 121 - 130.
  • 5Chase M. Multi-authorityattribute based encryption [ C ]// Proceedings of the 4th Conference on Theory of Cryptogra- phy. Berlin, Germany : Springer-Verlag ,2007:515 - 534.
  • 6Cheung L, Newport C. Provably secure ciphertext policy ABE [ C ]//Proceedings of the 14th ACM Conference on Com- puter and Communications Security. New York, NY, USA: ACM ,2007:456 - 465.
  • 7Dodis Y, Yampolskiy A. A verifiable random function with short proofs and keys[ C]//Proceedings of the 8th Interna- tional Workshop on Theory and Practice in Public Key Cryptography. Berlin, Germany : Springer,2005:416 - 431.
  • 8Lin H, Cao Z, Liang X, et al. Secure threshold multi authority attribute based encryption without a central authority [C]//Proceedings of 9th International Conference on Cryptology in India (INDOCRYPT 2008 ). Berlin, Germa- ny : Springer-Verlag ,2008:426 - 436.

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部