期刊文献+

一个适用于云计算环境的高效属性加密方案 被引量:1

An Efficient Attribute-Based Encryption Scheme for Cloud Computing
原文传递
导出
摘要 针对云计算环境下成员关系复杂多变的特点,本文在属性加密机制CP-ABE-DM的基础上,提出了一个安全的属性加密机制S-CP-ABE-DM,并在标准模型下给出了安全性证明.S-CP-ABE-DM继承了CP-ABE-DM的优点,支持动态成员管理和任意属性值,修补了CP-ABE-DM的安全漏洞,能够抵御本文构造的针对CP-ABEDM的攻击.实验结果显示与已有的属性加密方案相比,S-CP-ABE-DM更适合用于保护云计算环境下用户数据的安全性和隐私性. According to the complex membership under cloud computing environment,this paper proposes a secure attribute-based encryption scheme S-CP-ABE-DM based on CP-ABE-DM.Besides,we prove in the standard model that our scheme is secure.S-CP-ABE-DM inherits the advantages of CP-ABE-DM,supports dynamic membership and arbitrary-state attributes.S-CP-ABE-DM also avoids the security vulnerability of CP-ABE-DM,resists the attack on CP-ABE-DM constructed by this paper.Compared with the existing schemes,S-CP-ABE-DM is more suitable to protect the security and privacy of user data in cloud computing environment.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2015年第4期375-383,共9页 Journal of Wuhan University:Natural Science Edition
基金 信息保障技术重点实验室开放基金(KJ-13-104)
关键词 云计算 属性加密 动态成员管理 任意属性值 双线性对 cloud computing attribute-based encryption dynamic membership arbitrary-state attributes bilinear pairing
  • 相关文献

参考文献14

  • 1Armbrust M,Fox A,Griffith R,et al.A view of cloud computing[J].Commun ACM,2010,53(4):50-58.
  • 2Li M,Yu S,Zheng Y,et al.Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(1):131-143.
  • 3Wan Z,Liu J,Deng R H.HASBE:A hierarchical attribute-based solution for flexible and scalable access control in cloud computing[J].IEEE Transactions on Information Forensics and Security,2012,7(2):743-754.
  • 4Yu S,Wang C,Ren K,et al.Achieving secure,scalable,and fine-grained data access control in cloud computing[C]//INFOCOM,2010 Proceedings IEEE.Piscataway,NJ:IEEE,2010:1-9.
  • 5Sahai A,Waters B.Fuzzy identity-based encryption[C]//Advances in Cryptology-EUROCRYPT 2005.Berlin:Springer-Verlag,2005:457-473.
  • 6Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM conference on Computer and Communications Security.New York:ACM,2006:89-98.
  • 7Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]//Security and Privacy,2007.(SP’07)IEEE Symposium on.Piscataway,NJ:IEEE,2007:321-334.
  • 8苏金树,曹丹,王小峰,孙一品,胡乔林.属性基加密机制[J].软件学报,2011,22(6):1299-1315. 被引量:98
  • 9Fan C,Huang V,Ruan H.Arbitrary-state attributebased encryption with dynamic membership[J].IEEE Transactions on Computers,2014,63(8):1951-1961.
  • 10Boneh D,Franklin M.Identity-based encryption from the Weil pairing[J].SIAM Journal on Computing,2003,32(3):586-615.

二级参考文献57

  • 1Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer- Verlag, 1994. 480-491.
  • 2Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 3Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi: 10.1007/11535218_16].
  • 4Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology- CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984.47-53.
  • 5Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi: 10.1007/3-540-44647-8_13].
  • 6Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
  • 7Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 8Yu SC, Ren K, Lou WJ. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008.39-44. [doi: 10.1109/NPSEC.2008.4664879].
  • 9Traynor P, Butler K, Enck W, Mcdaniel P. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In: Proc. of the 15th Annual Network and Distributed System Security Symp. (NDSS 2008). San Diego: USENIX Association, 2008.1-13.
  • 10Cheung L, Newport C. Provably secure ciphertext policy ABE. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007.456-465. [doi: 10.1145/1315245.1315302].

共引文献103

同被引文献4

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部