期刊文献+

基于密文策略的权重多中心属性加密方案 被引量:3

Weighted multi-authority attribute encryption based on ciphertext policy
下载PDF
导出
摘要 针对已有的云存储方案无法有效支持多授权中心和属性权重的问题,提出了一种基于密文策略的多授权中心权重属性加密方案。利用伪随机函数在各个授权中心之间共享一个秘密参数,实现无可信中心的多授权中心机制。通过对来自所有授权中心的属性进行基于权重的分割,实现基于权重的加解密。分析表明,新方案是安全的,可以抵抗恶意用户和授权中心的合谋攻击,并可用于实现针对云存储的安全访问控制。 Most of existing cloud storage solutions can not support multi-authority and weight of attributes,so the weighted multi-authority attribute encryption based on ciphertext policy is proposed.The multi-authority ABE without a central authority is realized by apseudo-random function that shares a secret parameter among each authority.Encryption and decryption based on weighted attribute is achieved through weight-based segmentation of the attributes from all the authorization centers.Analysis result shows that the scheme is safe,which can resist the collusion attack from malicious users and authorized centers and control the secure access of cloud storage.
出处 《桂林电子科技大学学报》 2015年第5期386-390,共5页 Journal of Guilin University of Electronic Technology
基金 国家自然科学基金(61272037 61402366) 陕西省自然科学基础研究计划(2013JZ020 2015JQ6236) 陕西省国际科技合作与交流计划(2015KW-010) 西安邮电大学研究生创新基金(CXL2014-10 CXL2014-04)
关键词 属性加密 权重 多授权中心 云计算 attribute encryption weighted attribute multi-authority cloud computing
  • 相关文献

参考文献13

  • 1Sahai A,Waters B. Fuzzy identitDbased encryption [M]// Advances in Cryptology Eurocrypt, 2005:457-473.
  • 2Boneh D,Franklin M. Identity-based encryplion from the Weil pairing[C2//Advances in Cryptology-Crypto, 2001: 213-229.
  • 3Boneh D,Boyen X. Efficient selective-ID secure identity-based encryption without random oracles[C]//Advanees in Cryptology-Eurocrypt, 2004 : 223-238.
  • 4郑东,赵庆兰,张应辉.密码学综述[J].西安邮电大学学报,2013,18(6):1-10. 被引量:66
  • 5Goyal V,Pandey O, Sahai A, et al. Attribute-based eneryp- tion for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006 89-98.
  • 6刘西蒙,马建峰,熊金波,李琦,张涛.密文策略的权重属性基加密方案[J].西安交通大学学报,2013,47(8):44-48. 被引量:17
  • 7Chase M. Multi-authority attribute based encryption[M]// Theory of Cryptography, 2007 : 515-534.
  • 8Lin H uang,Cao Zhenfu, Liang Xiaohui, et al. Secure thresh- old multi authority attribute based encryption without a cen- tral authority [J]. Information Sciences, 2010, 180 ( 13 ) : 2618-2632.
  • 9Chase M,Chow S S M. Improving privacy and security in multi-authority attribute-based ertcryption[C]//Proceedings of the 16th ACM Conference on Computer and Communica- tions Security, 2009 : 121]30.
  • 10Wang Yun, Zhang Dalei, Zhong Hong. Multi-authority based weighted attribute encryption scheme in cloud eom- puting-C]//IEEE 2014 10th International Conference on Natural Computation, 2014 : 1033]038.

二级参考文献15

  • 1ZHENG Dong,LI Xiangxue,CHEN Kefei.LFSR-based Ring Signature Scheme[J].Chinese Journal of Electronics,2007,16(3):397-400. 被引量:3
  • 2ARMBRUST M, FOX A, GRIFFITH R, et al. A view of cloud computing [J]. Communications of the ACM, 2010,53(4):50 58.
  • 3SAHAI A, WATERS B. Fuzzy identity-based encryp tion [M]//LNCS: Volume 3494 Advances in Cryp tology-EUROCRYPT 2005. Berlin, Germany:Spring- er Verlag, 2005:557-557.
  • 4BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing [M]//LNCS: Volume 2139 Advances in Cryptology-CRYPTO 2001. Berlin, Ger many: Springer-Verlag, 2001:213 229.
  • 5BONEH D, BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles M] //LNCS: Volume 3027 Advances in Cryptology-EU ROCRYPT 2004. Berlin, Germany: Springer-Verlag, 2004:223-238.
  • 6BONEH D, BOYEN X. Secure identity based encryp- tion without random oracles [M] // LNCS: Volume 3152 Advances in CryptologyCRYPTO 2004. Ber- lin, Germany: Springer-Verlag, 2004:443-459.
  • 7WATERS B. Efficient identity-based encryption with- out random oracles [M] // LNCS.. Volume 3494 Ad- vances in CryptologyEUROCRYPT 2005. Berlin, Germany: Springer-Verlag, 2005:557 557.
  • 8GOYAL V, PANDEY O, SAHAI A, et al. Attrib- ute-based encryption for fine-grained access control of encrypted data [C // Proceedings of the 13th ACM Conference on Computer and Communications Securi- ty. New York, NY, USA: ACM, 2006:89-98.
  • 9CHEUNG L, NEWPORT C. Provably secure cipher- text policy ABE [-C // Proceedings of the 14th ACM Conference on Computer and Communications Securi- ty. New York, NY, USA: ACM, 2007:456-465.
  • 10BETHENCOURT J, SAHAI A, WATERS B. Ci- phertext-policy attribute-based encryption [-C//IEEE Symposium on Security and Privacy. Washington, DC, USA.. IEEE Computer Society, 2007:321 334.

共引文献81

同被引文献7

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部