期刊文献+

适应性安全且支持属性撤销的CP-ABE方案 被引量:4

Adaptively Security CP-ABE Scheme Supporting Attribute Revocation
下载PDF
导出
摘要 现有支持属性间接撤销的CP-ABE方案存在撤销代价与安全性难以兼顾的问题,为此,借鉴属性间接撤销思想和双系统加密技术,提出一个适应性安全且支持属性撤销的CP-ABE方案,并基于3素数子群判定问题证明该方案的安全性。分析结果表明,与经典ABE属性撤销方案相比,该方案的效率较高,访问策略表达更为灵活。 In the existing CP-ABE schemes that supporting attribute indirect revocation,the cost of revocation and its security can not be taken into account in the model simultaneously. Based on the idea of attribute indirect revocation and the dual system encryption technique,this paper constructs an adaptively security CP-ABE scheme that supports attribute revocation,and proves the security of the scheme using the 3P-SDP. Analysis result show s that,compared w ith the ABE schemes proposed before,the proposed scheme is more flexible and efficient in the access policy and attribute revocation.
作者 彭开锋 张席
出处 《计算机工程》 CAS CSCD 北大核心 2015年第4期151-155,共5页 Computer Engineering
基金 广东省自然科学基金资助项目(S2011010001206)
关键词 属性撤销 间接撤销模式 属性基加密 适应性安全 密文策略 双系统加密 attribute revocation indirect revocation mode Attribute-based Encryption(ABE) adaptive security cipher policy dual system encryption
  • 相关文献

参考文献17

  • 1Sahai A, Waters B. Fuzzy Identity-based Encryp- tion[C]//Proceedings of Cryptology-EUROCRYPT' 05. Berlin, Germany : Springer, 2005 : 457-473.
  • 2Bethencourt J, Sahai A, Waters B. Ciphertext-policy Attribute-based Encryption [ C ]//Proceedings of IEEE Symposium on Security and Privacy. Washington D. C. , USA :IEEE Press ,2007:321-334.
  • 3Waters B. Ciphertext-policy Attribute-based Encryption: An Expressive, Efficient, and Provably Secure Realiza- tion[ C]// Proceedings of PKC ' 11. Berlin, Germany: Springer,2011:53-70.
  • 4Goyal V, Pandey O, Sahai A, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[ C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York, USA : ACM Press ,2006:89-98.
  • 5Attrapadung N, Imai H. Attribute-based Encryption Supporting Direct/indirect Revocation Modes [ M]// Parker M G. Cryptography and Coding. Berlin, Germany: Springer ,2009 : 278-300.
  • 6苏金树,曹丹,王小峰,孙一品,胡乔林.属性基加密机制[J].软件学报,2011,22(6):1299-1315. 被引量:98
  • 7胡海英,商威.一种可撤销的KP-ABE方案[J].计算机系统应用,2013,22(9):123-128. 被引量:5
  • 8王鹏翩,冯登国,张立武.一种支持完全细粒度属性撤销的CP-ABE方案[J].软件学报,2012,23(10):2805-2816. 被引量:45
  • 9HanaokaY, Hanaoka G, Shikata J, et al. Identity-based Hierarchical Strongly Key-insulated Encryptiorl and Its Appl- ication [C ]//Proceedings of Cryptology-ASIACRYPT' 05.Berlin, Germany : Springer,2005 : 495 -514.
  • 10Boldyreva A, Goyal V, Kumar V. Identity-based Encryption with Efficient Revocation [ C ]//Proceedings of the 15th ACM Conference on Computer and Communications Security. New York, USA ACM Press, 2008:417-426.

二级参考文献106

  • 1Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer- Verlag, 1994. 480-491.
  • 2Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 3Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi: 10.1007/11535218_16].
  • 4Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology- CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984.47-53.
  • 5Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi: 10.1007/3-540-44647-8_13].
  • 6Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
  • 7Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 8Yu SC, Ren K, Lou WJ. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008.39-44. [doi: 10.1109/NPSEC.2008.4664879].
  • 9Traynor P, Butler K, Enck W, Mcdaniel P. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In: Proc. of the 15th Annual Network and Distributed System Security Symp. (NDSS 2008). San Diego: USENIX Association, 2008.1-13.
  • 10Cheung L, Newport C. Provably secure ciphertext policy ABE. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007.456-465. [doi: 10.1145/1315245.1315302].

共引文献136

同被引文献24

  • 1Niroshinie F,Seng W L,Wenny R.Mobile Cloud Computing:A Survey[J].Future Generation Computer Systems,2013,29(1):84-106.
  • 2Sriram N P,Zygmunt J H.A Practical,Secure,and Verifiable Cloud Computing for Mobile Systems[J].Procedia Computer Science,2014,34:474-483.
  • 3Khan A N,Mat K M,Khan S U,et al.Towards Secure Mobile Cloud Computing:A Survey[J].Future Generation Computer Systems,2013,29(5):1278-1299.
  • 4Sahai A,Waters B.Fuzzy Identity-based Encryption[M]//Cramer R.Advances in Cryptology-EUROCRYPT 2005.Berlin,Germany:Springer-Verlag,2005:457-473.
  • 5Ostrovsky R,Sahai A,Waters B.Attribute-based Encryption with Non-monotonic Access Structures[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:195-203.
  • 6Bethencourt J,Sahai A,Waters B.Ciphertext-Policy AttributeBased Encryption[C]//Proceedings of 2007 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,2007:321-334.
  • 7Hur J.Improving Security and Efficiency in Attributebased Data Sharing[J].IEEE Transactions on Knowledge and Data Engineering,2013,25(10):2271-2282.
  • 8Li Fei,Yog R,Mutt R,et al.Low Complexity Multiauthority Attribute Based Encryption Scheme for Mobile Cloud Computing[C]//Proceedings of the 7th IEEE International Symposium on Service-oriented System Engineering.Washington D.C.,USA:IEEE Computer Society,2013:573-577.
  • 9LüZhiquan,Chi Jialin,Zhang Min,et al.Efficiently Attribute-based Access Control for Mobile Cloud Storage System[C]//Proceedings of the 13th IEEE International Conference on Trust,Security and Privacy in Computing and Communications.Washington D.C.,USA:IEEE Computer Society,2014:292-299.
  • 10Zhou Zhibin,Huang Dijiang.Efficient and Secure Data Storage Operations for Mobile Cloud Computing[C]//Proceedings of the 8th International Conference on Network and Service Management.Laxenburg,Germany:International Federation for Information Processing,2012:37-45.

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部