期刊文献+

机构可问责的可追踪属性基加密方案 被引量:3

Traceable Attribute-based Encryption Scheme with Accountable Authority
下载PDF
导出
摘要 在属性基加密中,多个用户会共享公共属性,其中的一些用户可能会恶意地泄漏解密密钥,被追踪到的用户可能认为是管理机构泄漏密钥。为此,给出一个新的可追踪属性基加密方案,当被追踪到的用户质疑结构的可信性时,可运行问责算法确认是机构或用户的恶意行为。方案中的属性管理机构和身份管理机构均不能独立地解开系统中的密文。分析结果表明,该方案不仅实现用户的可追踪性,而且解决了可追踪密文策略属性基加密的机构可信依赖问题,实现了对管理机构的可问责性。 In Attribute-based Encryption(ABE), as the users in an ABE system may share some common attributes, some malicious users may leak their decryption ability corresponding to the common attributes. As the authority of ABE system can use the master secret key to generate any secret keys, a traced user may argue that it is the authority that generates the leaked secret key. This paper presents a scheme of an accountable and traceable ABE of an authority. A traced user can take advantage of accountability algorithm to further check whether it is the malicious act from the authority or the user. In this scheme, the authority of ABE system and the authority of identity management are mutually independent,and cannot unlock the ciphertext by their own. Analysis shows that the scheme not only realizes the user traceable, but also solves the credit problem of the authority of ABE system with accountability.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第7期163-170,176,共9页 Computer Engineering
关键词 属性基加密 可追踪算法 加密算法 身份基广播加密 可问责身份基广播加密 Attribute-based Encryption ( ABE ) traceable algorithm encryption algorithm identity-based broadcast encryption accountable identity-based broadcast encryption
  • 相关文献

参考文献18

  • 1Sahai A,Waters B.Fuzzy Identity-based Encryption[C]//Proceedings of EUROCRYPT’05.Aarhus,Denmark:Springer,2005:457-473.
  • 2Boneh D,Franklin MK.Identity-based Encryption from the Weil Pairing[C]//Proceedings of CRYPTO’01.Santa Barbara,USA:Springer,2001:213-229.
  • 3Goyal V,Pandey O,Sahai A,et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of ACM Conference on Computer and Communications Security.Alexandria,USA:ACM Press,2006:89-98.
  • 4Fiat A,Naor M.Broadcast Encryption[C]//Proceedings of CRYPTO’93.Santa Barbara,USA:Springer,1993:480-491.
  • 5Waters B.Ciphertext-policy Attribute-based Encryption:An Expressive,Efficient,and Provably Secure Realization[C]//Proceedings of CRYPTO’11.Taormina,Italy:Springer,2011:53-70.
  • 6Lewko A B,Okamoto T,Sahai A,et al.Fully Secure Functional Encryption:Attribute-based Encryption and(Hierarchical)Inner Product Encryption[C]//Proceedings of EUROCRYPT’10.Nice,France:Springer,2010:62-91.
  • 7Allison B.Lewko and Brent Waters.New Proof Methods for Attribute-based Encryption:Achieving Full Security Through Selective Techniques[C]//Proceedings of CRYPTO’12.Santa Barbara,USA:Springer,2012:180-198.
  • 8Cheung L,Newport C C.Provably Secure Ciphertext Policy ABE[C]//Proceedings of ACM Conference on Computer and Communications Security.Alexandria,USA:ACM Press,2007:456-465.
  • 9Garg S,Gentry C,Halevi S,et al.Attribute-based Encryption for Circuits from Multilinear Maps[C]//Proceedings of CRYPTO’13.Santa Barbara,USA:Springer,2013:479-499.
  • 10Herranz J,Laguillaumie F,Rafols C.Constant Size Ciphertexts in Threshold Attribute-based Encryption[C]//Proceedings of Public Key Cryptography Conference.Paris,France:Springer,2010:19-34.

二级参考文献22

  • 1Sahai A, Waters B. Fuzzy identity based encryption//Pro- ceedings of the EUROCRYPT 2005. Aarhus, Denmark, 2005 : 457-473.
  • 2Goyal V, Pandey O, Sahai A, Waters B. Attribute-based en- cryption for fine-grained access control of encrypted data//Pro ceedings of the 13th ACM Conference on Computer and Com- munication Security. Alexandria, VA, USA, 2006:89-98.
  • 3Betheneourt J, Sahai A, Waters B. Ciphertext-policy attrib- ute-based encryption//Proceedings of the 2007 IEEE Sympo- sium on Security and Privacy. Washington, USA, 2007: 321-334.
  • 4Traynor P, Butler K, Enck W, Mcdaniel P. Realizing mas sive-scale conditional access systems through attribute-based cryptosystems//Proceedings of the 15th NDSS 2008. San Diego, USENIX Association, 2008:1-13.
  • 5Yu S C, Ren K, Lou W J. Attribute-based content distribu tion with hidden policy//Proceedings of the 4th Workshop on Secure Network Protocols. Orlando, 2008: 39-44.
  • 6Lewko A, Okarnoto T, Sahai A, Takashima K, Waters B. Fully secure functional encryption: Attribute-based encryp- tion and (hierarchical) inner product encryption//Proceed ings of the EUROCRYPT 2010. Monaco, 2010: 62-91.
  • 7Hinek M J, Jiang S, Safavi-Naini R, Shahandashti S F. Attribute-based encryption with key cloning protection. Cryptology ePrint Archive: Report 2008/478, 2008.
  • 8Yu S C, Ren K, Lou W J, Li J. Defending against key abuse attacks in KP ABE enabled broadcast system//Proceedings of the Security and Privacy in Communication Networks. Athens, Greece, 2009:311-329.
  • 9Li J, Ren K, Zhu B, Wan Z G. Privacy aware attribute- based encryption with user accountability//Proceedings of the Information Security Conference :?009. 2009:347-362.
  • 10Wang Y T, Chen K F, Chen J H. Attribute based traitor tracing. Journal of Information Science and Engineering, 2011, 27(1): 181-195.

共引文献59

同被引文献74

  • 1牛德华,马建峰,马卓,李辰楠,王蕾.基于属性的安全增强云存储访问控制方案[J].通信学报,2013,34(S1):276-284. 被引量:12
  • 2钱海峰,李祥学,郁昱.基于广义切比雪夫多项式的身份基加密体制安全性分析[J].中国通信,2012,1:124-130.
  • 3Niroshinie F,Seng W L,Wenny R.Mobile Cloud Computing:A Survey[J].Future Generation Computer Systems,2013,29(1):84-106.
  • 4Sriram N P,Zygmunt J H.A Practical,Secure,and Verifiable Cloud Computing for Mobile Systems[J].Procedia Computer Science,2014,34:474-483.
  • 5Khan A N,Mat K M,Khan S U,et al.Towards Secure Mobile Cloud Computing:A Survey[J].Future Generation Computer Systems,2013,29(5):1278-1299.
  • 6Sahai A,Waters B.Fuzzy Identity-based Encryption[M]//Cramer R.Advances in Cryptology-EUROCRYPT 2005.Berlin,Germany:Springer-Verlag,2005:457-473.
  • 7Ostrovsky R,Sahai A,Waters B.Attribute-based Encryption with Non-monotonic Access Structures[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:195-203.
  • 8Bethencourt J,Sahai A,Waters B.Ciphertext-Policy AttributeBased Encryption[C]//Proceedings of 2007 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,2007:321-334.
  • 9Hur J.Improving Security and Efficiency in Attributebased Data Sharing[J].IEEE Transactions on Knowledge and Data Engineering,2013,25(10):2271-2282.
  • 10Li Fei,Yog R,Mutt R,et al.Low Complexity Multiauthority Attribute Based Encryption Scheme for Mobile Cloud Computing[C]//Proceedings of the 7th IEEE International Symposium on Service-oriented System Engineering.Washington D.C.,USA:IEEE Computer Society,2013:573-577.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部