期刊文献+

支持属性撤销的外包解密方案 被引量:14

Outsourced decryption scheme supporting attribute revocation
原文传递
导出
摘要 为了减少基于密文策略的属性加密(ciphertext-policy attribute-based encryption,CP-ABE)方案中用户和数据拥有者(data owner,DO)的计算量,该文提出一种方法,将解密密钥分为2部分,其中一部分存放在用户端,另一部分存储于代理者(例如云服务提供商CSP),使得属性撤销操作不会对用户产生影响,并且由于CSP进行了部分解密工作,使得用户的解密计算量降低。分析证明该方案可以减小用户和DO的计算量和通信量,并且可抵抗选择明文攻击。 The computational overhead for both the users and the data owners (DO) in ciphertext policy attribute-based encryption (CP ABE) schemes is reduced by dividing the deeryption key into two parts. One part is stored with the user while the other part is stores in the proxy (such as the cloud service provider, CSP) side. Users are not affected by attribute revocation and the computational overhead of the users is reduced because CSP does part of the decryption. The scheme reduces the computation and communication overhead for users and DO and is secure against chosen plaintext attacks.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2013年第12期1664-1669,共6页 Journal of Tsinghua University(Science and Technology)
基金 中央高校基本科研业务费专项资金资助项目(2012JBM004)
关键词 云存储 访问控制 外包解密 属性加密 cloud storage access control outsourced deeryption attribute-based encryption
  • 相关文献

参考文献9

  • 1Mell P, Grance T. The NIST Definition of Cloud Computing [S]. Gaithersburg, USA: National Institute of Standards and Technology, 2011.
  • 2Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption [C]// Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P'07). Oakland, USA: IEEE Computer Society, 2007: 321-334.
  • 3Waters B. Ciphertext-policy attribute based encryption: An expressive, efficient, and provably secure realization [C]//Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography (PKC 2011). Heidelberg, Germany: Springer, 2011: 53-70.
  • 4吕志泉,张敏,冯登国.云存储密文访问控制方案[J].计算机科学与探索,2011,5(9):835-844. 被引量:34
  • 5Yang K, Liu Z, Cao Z, et al. TAAC: Temporal attribute-based access control for multi-authority cloud storage systems [Z/OL]. (2013-10-15), http: //eprint. iacr. org/2012/651.
  • 6Lewko A, Waters B. Decentralizing attribute-based encryption [C]//Proceedings of the 30th Annual International Conference on Theory and Applications of Cryptographie Techniques : Advances in Cryptology. Heidelberg, Germany: Springer, 2011: 568-588.
  • 7Ruj S, Nayak A, Stojmenovic I. DACC: Distributed access control in clouds [C]// Proceedings of the 2011 IEEE 10th International Conference on Security and Privacy in Computing and Communications (TrustCom 2011 ). Liverpool, UK: IEEE, 2011: 91- 98.
  • 8Li J, Chen X, Li J, et al. Fine grained access control system based on outsourced attribute-based encryption [C]// Proceedings of the 18tb European Symposium on Research in Computer Security ESORICS 2013. Heidelberg, Germany: Springer, 2013:592 - 609.
  • 9Matthew G, Hohenberger S, Waters B. Outsourcing the decryption of ABE Ciphertexts [C]// Proceedings of the USENIX Security Symposium. San Francisco, USA: USENIX, 2011: 523-538.

二级参考文献14

  • 1Dignan L. Cloud computing hasn't gone fortune 500 yet, but it's coming[EB/OL]. [2011-04]. http://blogs.zdnet.com/ BTL/?p=8199.
  • 2Shamir A. Identity-based cryptosystems and signature schemes[C]//LNCS 196: Proceedings of the Advances in Cryptology (CRYPTO), 1985. Berlin, Heidelberg: Springer- Verlag, 1985: 47-53.
  • 3Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Proceedings of the Advances in Cryptology (CRYPTO), 2001. Berlin, Heidelberg: Springer- Veflag, 2001: 213-229.
  • 4Sahai A, Waters B. Fuzzy identity based encryption[C]// Proceedings of the Advances in Cryptology (EUROCRYPT), Aarhus, Denmark, 2005. Berlin, Heidelberg: Springer- Verlag, 2005: 457--473.
  • 5Goyal V, Pandey O, Sahai A, et al. Attribute based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). New York, NY, USA: ACM, 2006: 89-98.
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, California, USA, 2007. Washington, DC, USA: IEEE Computer Society, 2007: 321-334.
  • 7Liang Xiaohui, Cao Zhenfu, Lin Huang, et al. Attribute based proxy re-encryption with delegating capabilities[C]//Proceedings of the 4th International Symposium on Information, Computer and Communications Security (ASIACCS 2009). New York, NY, USA: ACM, 2009: 276-286.
  • 8Hong Cheng, Zhang Min, Feng Dengguo. AB-ACCS: a cryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development, 2010, 47(Suppl): 259-265.
  • 9Pirretti M, Traynor P, McDaniel P, et al. Secure atrribute-based systems[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). New York, NY, USA" ACM, 2006: 99-112.
  • 10Yu Shucheng, Wang Cong, Ren Kui, et al. Attribute based data sharing with attribute revocation[C]//Proceedings of the 5th International Symposium on Information, Computer and Communications Security (ASIACCS 2010). New York, NY, USA: ACM, 2010: 261-270.

共引文献33

同被引文献70

  • 1曹珍富.密码学的新发展[J].四川大学学报(工程科学版),2015,47(1):1-12. 被引量:27
  • 2GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryp- tion for fine-grained access control of encrypted data [ C]//Proceed- ings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006:89-98.
  • 3HORVtTH M. Attribute-based encryption optimized for cloud com- puting [ J]. Infocommunications Journal, 2015, 7(2): 1 -9.
  • 4BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy at- tribute-based encryption [ C]//SP 2007: Proceedings of the 2007 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2007:321 - 334.
  • 5WATERS B. Ciphertext-policy attribute-based encryption: an ex- pressive, efficient, and provably secure realization [ C]// PKC 2011: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, LNCS 6751. Berlin: Springer, 2011:53-57.
  • 6PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure attrib- ute-based systems [ J]. Journal of Computer Security, 2010, 18 (5): 799 -837.
  • 7ASIM M, LUAN I, PETKOVIC M. Ciphertext-policy attribute- based broadcast encryption scheme [ C ]// Communications and Multimedia Security: Proceedings of the 12th IFIP TC 6/TC 11 In- ternational Conference on Communications and Multimedia Securi- ty, LNCS 7025. Berlin: Springer, 2011:244 -246.
  • 8BELQASMI F, GLITHO R, FU C. RESTful Web services for serv- ice provisioning in next generation networks: a survey [ J]. IEEE Communications Magazine, 2011, 49(12) : 66 -73.
  • 9Sahai A,Water B. Fuzzy identity-based encryption[C]//Proc of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Vet- lag, 2005 : 457-473.
  • 10Goyal V, Pandey O, Sahai A, et al. Attribute based encryption for fine-grained access control of encrypted data[C]//Proc of ACM Conference on Computer and Communications Security. New York: ACM Press, 2006 : 89-98.

引证文献14

二级引证文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部