期刊文献+

基于密文策略多机构属性基加密方案 被引量:3

Multi-Authority Ciphertext-Policy Attribute-Based Encryption Scheme
原文传递
导出
摘要 Chase提出multi-authority attribute based encryption方案的安全性完全受限于Center Authority(CA)的可信性,为解除该限制,本文提出基于密文策略多机构属性基加密方案,通过结合密文策略思想去除了CA.通过引入树形访问策略及Shamir秘钥安全共享技术,实现了共享信息细粒度灵活访问控制并支持系统属性的有效撤销.安全性分析表明了本方案在标准模型下是适应性选择明文安全(CPA)的. Multi-authority Attribute Based Encryption by Chase,which Limited by Center Authority's credibility.In order to remove the limitation,this paper propose Multi-authority Ciphertext-Policy Attribute-based Encryption Scheme,it can effectively remove the Center Authority(Center Authority,CA)with combining ciphertext-policy thoughts.In addition,it can achieve fine grained access control of shared information by adopting tree access strategy and secret sharing scheme,and supports system attribute revocation scheme.Finally,the security analysis shows that the scheme is secure against chosen plaintext attack under the Decision Bilinear Diffie-Hellman(DBDH)assumption in the standard model.
作者 陶启 黄晓芳
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2015年第6期545-548,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(61303230) 四川省科技支撑计划资助项目(11ZS2010)
关键词 密文策略 多机构属性基加密 细粒度控制 存储安全 ciphertext-policy multi-authority attribute-based encryption fine grained access control secure sharing
  • 相关文献

参考文献13

  • 1Sahai A, Waters B. Fuzzy identity-based encryption[C]I I Proceedings of Advances in Cr v ptolog y-Ei.Ilct'): CRYPT. Berlin, Heidelberg: Springer-Verlag, 2005: 457-473.
  • 2苏金树,曹丹,王小峰,孙一品,胡乔林.属性基加密机制[J].软件学报,2011,22(6):1299-1315. 被引量:98
  • 3Goyal V, Pandey 0, Sahai A, et al. Attribute-Based encryption for fine-grained access control of encrypted data[C]I I Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM Press, 2006: 89-98.
  • 4BethencourtJ, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption[C]I I Proceedings of the 2007 IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 2007: 321-334.
  • 5Ostrovsky R,Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures[DB/OL]. [2015-01-21]. https:lleprint. iacr, org/2007/323. pdf.
  • 6Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization[C]IIProceedings of the 14th International Conference on Practie and Theory in Public Key Cryptography. Berlin: Springer, 2011: 53-70.
  • 7Pirretti M, Trayno P, McDaniel P, et al. Secure attribute-based systems[C]/ / Proceedings of the 13th ACM conference on Computer and Communications Security. New York: ACM, 2006: 99-112.
  • 8Ibraimi L, Tang Q, Hartel r. et al. Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes[DB/OL].[2015-01-25]. http:// core. ac. ukl doumload] pdf 122875759. pdf.
  • 9Shamir A. How to share a secret[J]. Communications of the ACM, 1979 ,22(11): 612-613.
  • 10王锦晓,张旻,陈勤.一种高效属性可撤销的属性基加密方案[J].计算机应用,2012,32(A01):39-43. 被引量:7

二级参考文献93

  • 1Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer- Verlag, 1994. 480-491.
  • 2Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 3Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi: 10.1007/11535218_16].
  • 4Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology- CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984.47-53.
  • 5Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi: 10.1007/3-540-44647-8_13].
  • 6Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
  • 7Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 8Yu SC, Ren K, Lou WJ. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008.39-44. [doi: 10.1109/NPSEC.2008.4664879].
  • 9Traynor P, Butler K, Enck W, Mcdaniel P. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In: Proc. of the 15th Annual Network and Distributed System Security Symp. (NDSS 2008). San Diego: USENIX Association, 2008.1-13.
  • 10Cheung L, Newport C. Provably secure ciphertext policy ABE. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007.456-465. [doi: 10.1145/1315245.1315302].

共引文献127

同被引文献5

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部