期刊文献+

能保护隐私且属性可扩展的云数据共享 被引量:4

Cloud-based data sharing scheme with preserved privacy and supported attribute extension
下载PDF
导出
摘要 提出一种具有隐私保护且属性可扩展的云数据共享方案。采用混合加密体制实现数据的机密性并保护用户的属性隐私,其中文件的加密采用标准的对称加密算法,对称密钥的加密采用密文策略下基于属性的加密算法。在匿名文件创建过程中,基于哈希函数对一个随机参数和文件进行绑定,实现系统的属性扩展。安全性分析表明,新方案具有语义安全性,可抵抗恶意用户和云服务器的合谋攻击,能在保护用户属性隐私的同时实现系统的属性扩展。 A cloud-based data sharing scheme with preserved privacy and supported attribute extension is proposed. In the proposed scheme, a hybrid encryption mechanism is adopted to realize data confidentiality and users' attribute privacy protection, where files are encrypted based on a standard symmetric encryption algorithm and symmetric keys are encrypted by a ciphertext-policy attribute-based encryption algorithm. In the phase of anonymous file creation, system attribute extension is achieved by binding a random parameter with a file based on hash functions. A security analysis indicates that the proposed has semantic security and is secure against collusion attacks from malicious users and cloud servers. In addition, it can simultaneously protect users' attribute privacy and support system attribute extension.
作者 张应辉
出处 《西安邮电大学学报》 2015年第6期74-78,共5页 Journal of Xi’an University of Posts and Telecommunications
基金 国家自然科学基金资助项目(61402366 61272037) 国家科技重大专项课题(2013ZX03002004) 陕西省自然科学基础研究计划资助项目(2013JZ020 2015JQ6236) 陕西省教育厅科学研究计划资助项目(15JK1686)
关键词 云计算 数据共享 隐私保护 属性扩展 基于属性的加密 cloud computing, data sharing, privacy protection, attribute extension, attribute- based encryption
  • 相关文献

参考文献16

  • 1Goyal V, Pandey O, Sahai A, et al. Attribute-basedEncryption for Fine-grained Access Control of En-crypted Data [ C]//Shmatikov V. Proceedings of the2006ACM Conference on Computer and Communica-89-98.
  • 2Bethencourt J,Sahai A, Waters B. Ciphertext-policyAttribute-based Encryption [C]//Proceedings of the2007IEEE Symposium on Security and Privacy-SP707. Piscataway: IEEE, 2007 : 321-334.
  • 3Yu Shucheng,Wang Cong, Ren Kui,et al. AttributeBased Data Sharing with Attribute Revocation [C]//Feng Dengguo, Basin D. Proceedings of the 2010ACM Symposium on Information, Computer and Com-munication Security-ASIACCS? 10. New York: ACM,2010: 261-270.
  • 4Zhang Yinghui, Chen Xiaofeng, Li Jin, et al. FDR-ABE: Attribute-based Encryption with Flexible andDirect Revocation [C]//Fatos X. Proceedings of the2013 International Conference on Intelligent Networ-king and Collaborative Systems-INCoS, 13. Piscat-away: IEEE,2013: 38-45.
  • 5Zhang Yinghui, Chen Xiaofeng,Li Jin, et al. Attrib-ute-based Data Sharing with Flexible and Direct Revo-cation in Cloud Computing [J]. KSII Transactions onInternet Information Systems, 2014,8 (11):4028-4049.
  • 6王鹏翩,冯登国,张立武.一种支持完全细粒度属性撤销的CP-ABE方案[J].软件学报,2012,23(10):2805-2816. 被引量:45
  • 7Ge Aijun, Zhang Rui,Chen Chen,et al. ThresholdCiphertext Policy Attribute-based Encryption withConstant Size Ciphertexts[C]//Susilo W, Mu Yi, Se-berry J. Proceedings of the 2012 Australasian Confer-ence Information Security and Privacy-ACISP 9 12.Berlin: Springer, 2012 : 336-349.
  • 8张应辉,郑东,李进,李晖.密文长度恒定且属性直接可撤销的基于属性的加密[J].密码学报,2014,1(5):465-480. 被引量:14
  • 9Zhang Yinghui, Zheng Dong, Chen Xiaofeng,et al.Computationally Efficient Ciphertext-policy Attribute-based Encryption with Constant-size Ciphertexts[C]//ence on Provable Security-ProvSec,14,Berlin: Spring-er, 20X4: 259-273.
  • 10Lewko A,Waters B. Decentralizing Attribute-basedEncryption[C]//Paterson G. Advances in Cryptology-EUROCRYPT,ll. Berlin: Springer, 2011: 568-588.

二级参考文献22

  • 1ZHENG Dong,LI Xiangxue,CHEN Kefei.LFSR-based Ring Signature Scheme[J].Chinese Journal of Electronics,2007,16(3):397-400. 被引量:3
  • 2Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology--EUROCRYPT 2005. Berlin: Springer-Verlag, 2005.457-473. [doi: 10.1007/11426639_27].
  • 3Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 4Ostrovsky R, Sahai A, Waters B. Attribute-Based encryption with non-monotonic access structures. In: Proc. of the 14th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007. 195-203. [doi: 10.1145/1315245.1315270].
  • 5Attrapadung N, Imai H. Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B, eds. Proc. of the Pairing-Based Cryptography--Pairing 2009. Berlin: Springer-Verlag, 2009.248-265. [doi: 10.1007/978-3-642-03298-1_16].
  • 6Attrapadung N, Imai H. Attribute-Based encryption supporting direct/indirect revocation modes. In: Parker MG, ed. Proc. of the Cryptography and Coding. Berlin: Springer-Verlag, 2009. 278-300. [doi: 10.1007/978-3-642-10868-6_17].
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Poliey attribute-based encryption. In: Proc. of the 2007 IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2007. 321-334. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?amumber=4223236 [doi: 10.1109/SP.2007.11].
  • 8Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Catalano D, Catalano N, eds. Proc. of the Public Key Cryptography (PKC 2011). Berlin: Springer-Verlag, 2011. 53-70. [doi: 10.1007/978-3- 642-19379-8_4].
  • 9Su JS, Cao D, Wang XF, Sun YP, Hu QL. Attribute based encryption schemes. Journal of Software, 2011,22(6): 1299-1315 (in Chinese with English abstract), http://www.jos.org.cn/1000-9825/3993.htm [doi: 10.3724/SP.J.1001.2011.03993].
  • 10Hanaoka Y, Hanaoka G, Shikata J, Imai H. Identity-Based hierarchical strongly key-insulated encryption and its application. In: Roy B, cd. Advances in Cryptology--ASIACRYPT 2005. Berlin: Springer-Verlag, 2005. 495-514. Idol: 10.1007/11593447_27].

共引文献118

同被引文献50

  • 1DIFFIE W,HELLMAN M E.New Directions in Cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
  • 2SHOR P W.Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer[J].SIAM Journal on Computing,1997,26(5):1484-1509.
  • 3PEIKERT C.Public-key cryptosystems from the worst-case shortest vector problem:extended abstract[C]//41st ACM Symposium on Theory of Computing.Washington D C:SIGACT,2009:333-342.
  • 4MICCIANCIO D,PEIKERT C.Trapdoors for Lattices:Simpler,Tighter,Faster,Smaller[EB/OL]//Advances in Cryptology:EUROCRYPT 2012.UK Cammbridge:Springer Berlin Heidelberg,2012,700-718[2015-11-24].http://link.springer.com/chapter/10.1007%2F978-3-642-29011-4_41.
  • 5STEHLE D,STEINFELD R.Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices[EB/OL]//IACR Cryptology ePrint Archive:Report 2013/004[2015-11-20].http://eprint.iacr.org/2013/004/20130111:212943.
  • 6ALPERIN-SHERIFF J,PEIKERT C.Circular and KDM Security for Identity-Based Encryption[EB/OL]//Public Key Cryptography:PKC 2012.Germany Darmstadt:Springer Berlin Heidelberg,2012:334-352[2015-11-20].http://link.springer.com/chapter/10.1007%2F978-3-642-30057-8_20.
  • 7PEIKERT C.Public-key cryptosystems from the worst-case shortest vector problem:extended abstract[EB/OL]//The 41st ACM Symposium on Theory of Computing(STOC 2009).Washington D C:SIGACT,2009:333-342[2015-11-20].http://dl.acm.org/citation.cfm?id=1536461.
  • 8GENTRY C,PEIKERT C,VAIKUNTANATHAN V.Trapdoors for hard lattices and new cryptographic constructions[EB/OL]//STOC’08 Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing.New York:ACM,2008:197-206[2015-11-25].http://dl.acm.org/citation.cfm?doid=1374376.1374407.DOI:10.1145/1374376.1374407.
  • 9LYUBASHEVSKY V.Lattice Signatures without Trapdoors[EB/OL]//Advances in Cryptology:EUROCRYPT 2012.UK Cambridge:Springer Berlin Heidelberg,2012:738-755[2015-11-18].http://link.springer.com/chapter/10.1007%2F978-3-642-29011-4_43.
  • 10ABDALLA M,FOUQUE P A,LYUBASHEVSKY V,et al.Tightly-Secure Signatures from Lossy Identification Schemes[EB/OL].Journal of Cryptology,2012,7237(1):572-590[2015-11-11].http://link.springer.com/article/10.1007%2Fs00145-015-9203-7.

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部