期刊文献+

一种无可信第三方的密文策略属性加密方案 被引量:2

Removing trusted third party of ciphertext-policy attribute-based encryption scheme
原文传递
导出
摘要 针对现有云环境中密文策略属性加密都依赖于一个可信密钥生成机构的问题,提出一种无可信第三方的密文策略属性加密方案.该方案使密钥生成机构在负责用户认证和属性管理时,必须与另一方(如云服务提供商)通过安全双方计算协议来生成密钥,而它们中的任何一方都没有能力单独解密密文.安全性分析表明,所提出的方案能够解决单独密钥生成机构所带来的安全性问题,而且用户端仅需一次加法运算,提高了计算效率. The existing ciphertext-policy attribute-based encryption(CP-ABE) schemes have to rely on a single trusted key generation center in cloud computing.Therefore,a removing trusted third party of CP-ABE scheme is proposed.The key generation center(KGC) is responsible for the user identity authentication and attributes management,which must be with the other party(cloud service providers) through secure two party computation protocol to generate keys,and neither of them has the ability to decrypt the ciphertexts.The security analysis shows that the proposed scheme can solve the security problem caused by the single trusted key generation center,and the end-user only needs once addition operation and the computional efficiency is greatly improved.
出处 《控制与决策》 EI CSCD 北大核心 2015年第9期1630-1634,共5页 Control and Decision
基金 国家自然科学基金项目(61163025 61462069) 内蒙古自然科学基金项目(2012MS0912)
关键词 属性加密 安全双方计算 可信第三方 访问控制 attribute-based encryption secure two-party computation trusted third-party access control
  • 相关文献

参考文献15

  • 1Shamir. Identity-based cryptosystems and signature schemes[C]. Proc of CRYPTO'84 on Advances in Cryptology. Heidelberg, 1985: 47-53.
  • 2Boneh Dan, Matt Franklin. Identity-based encryption from the weil pairing[C]. Proc of the 21st Annual Int Cryptology Conf on Advances in Cryptology. California, 2001: 213- 229.
  • 3Sahai A, Waters B. Fuzzy identity based encryption[C]. Advances in Cryptology-Eurocrypt. Aarhus, 2005: 457- 473.
  • 4Sahai A, Waters B. Ciphertext-policy attribute based encryption[C]. Proc IEEE Symposium on Security and Privacy. California: IEEE Computer Society, 2007: 321- 334.
  • 5Yong Cheng, Jiangchun Ren. Attributes union in CP- ABE algorithm for large universe cryptographic access control[C]. 2012 the 2nd Int Conf on Cloud and Greed Computing. Xiangtan: IEEE Computer Society, 2012: 181- 185.
  • 6Junbeom Hur, Dong Kun Noh. Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Trans on Parallel and Distributed Systems, 2011, 22(7): 1214-1221.
  • 7Zhiguo Wan, Jun'e Liu, Robert H Deng. HASBE: A hierarchical attribute-based solution for flexible and scalable acce[J]. IEEE Trans on Information Forensics and Security, 2012, 7(2): 743-754.
  • 8Chase M, Chow S S M. Improving privacy and security in multi-authority attribute-based encryption[C]. Proc ACM Conf on Computer and Communications Security. Chicago: ACM, 2009: 121-130.
  • 9Chow S S M. Removing escrow from identity-based encryption[C]. Proc PKC2009. Irvine, 2009, 5443: 256- 276.
  • 10Hur Junbeom. Removing escrow from ciphertext policy attribute-based encryption[J]. Computers and Mathematics with Applications, 2013, 65(9): 1310-1317.

二级参考文献8

  • 1罗文俊,李祥.多方安全矩阵乘积协议及应用[J].计算机学报,2005,28(7):1230-1235. 被引量:34
  • 2张禾瑞,郝纳新.高等代数[M].4版.北京:高等教育出版社,1999.
  • 3Yao A C.Protocols for secure computation[C]//Proc of the 23rd Annual IEEE Symposium on Foundations of Computer Science, Chicago, 1982:160-164.
  • 4Goldreich O,Micali S,Wigderson A.How to play any mental game[C]// Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, 1987:218-229.
  • 5Naor M,Pinkas B.Oblivious transfer with adaptive queries[C]//Proceedings of Cryto'99,Santa Barbara,California,1999:573-590.
  • 6Goldreich O,Goldwasser S,Linial N.Fauh-tolerant computation in the full information model[C]//32nd FOCS,1991:447-457.
  • 7Ostrovsky R,Yung M.How to withstand mobile virus attacks[C]// Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing, 1991:51-59.
  • 8柯召 孙琦.数论讲义[M].北京:高等教育出版社,1986.226-227.

共引文献8

同被引文献5

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部