期刊文献+

支持动态策略更新的半策略隐藏属性加密方案 被引量:21

Partially policy hidden CP-ABE supporting dynamic policy updating
下载PDF
导出
摘要 基于密文策略的属性加密被认为适用于云存储的环境,但当数据拥有者需要更新访问策略时,现有的更新方式因受数据的规模和属性集的大小的限制,会使数据拥有者增加相应的计算开销和通信开销。同时,以明文形式存放在云端的访问策略也会造成用户数据的隐私泄露。针对以上2个问题,提出了一种支持动态策略更新的半策略隐藏属性加密方案,使用所提方案进行策略更新时,用户的计算开销减少,大量的计算由云服务器承担。由于使用了半策略隐藏,用户的具体属性值不会泄露给其他任何第三方,有效保护了用户的隐私。此外,所提方案可以支持任何形式的策略更新,在标准模型下证明了方案是自适应选择明文攻击(CPA)安全的。 Ciphertext-policy attribute-based encryption(CP-ABE) was considered to be appropriate for cloud storage.However, under traditional CP-ABE scheme which was limited in terms of the scale of the data and the quantities of the attributes, computation and communication costs would be introduced correspondingly whenever the data owner wants to update the policy. Moreover, the policy which was stored in the form of plaintext would also result in privacy leakage.Aiming at tackling the above two problems, a novel scheme called partially policy hidden CP-ABE supporting dynamic policy updating(DPUPH-CP-ABE) was proposed. Through utilizing proposed scheme, the computation cost will be reduced, especially on user side, leaving the most computational work to the cloud server. Meanwhile, the value of the user's attributes will never be revealed to any third parties, and the users' privacy will be effectively preserved. Besides,the scheme is proved to be adaptively chosen plaintext attack(CPA) secure in the standard model and can support any types of policy updating.
出处 《通信学报》 EI CSCD 北大核心 2015年第12期178-189,共12页 Journal on Communications
基金 国家自然科学基金资助项目(61202179 61173089 61472298 U1135002) 国家高技术研究发展计划("863"计划)基金资助项目(2015AA016007) 教育部留学回国人员科研启动计划基金资助项目~~
关键词 密文策略属性加密 动态策略更新 半策略隐藏 标准模型 自适应选择明文攻击安全 ciphertext-policy ABE dynamic policy updating partially policy hidden standard model adaptive chosen plaintext attack secure
  • 相关文献

参考文献19

  • 1YU S, WANG C, REN K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[A]. INFOCOM, 2010 Proceedings IEEE[C]. 2010. 1-9.
  • 2SAHAI A, WATERS B. Fuzzy Identity-Based Encryption[M]. Springer Berlin Heidelberg, 2005.
  • 3GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for free-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Secu- rity[C]. ACM, 2006.89-98.
  • 4BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attrib- ute-based encryption[A]. Security and Privacy[C]. 2007.321-334.
  • 5WATERS B. Ciphertext-Policy Attribute-Based Encryption: An Ex- pressive, Efficient, and Provably Secure Realization[M]. Springer Ber- lin Heidelberg, 2011.
  • 6CHASE M. Multi-Authority Attribute based Encryption[M]. Theory of Cryptography. Springer Berlin Heidelberg, 2007.
  • 7LEWKO A, WATERS B. Decentralizing Attribute-based Encryp- tion[M]. Springer Berlin Heidelberg, 2011.
  • 8LIU Z, CAO Z, HUANG Q, et al. Fully secure multi-authority cipher- text-policy attribute-based encryption without random oracles[A]. Computer Security-ESORICS 2011[C]. Springer Berlin Heidelberg, 20 l 1. 278-297.
  • 9SAHAI A, SEYALIOGLU H, WATERS B. Dynamic credentials and ciphertext delegation for attribute-based encryption[A]. Advances in Cryptology2RYPTO 2012[C]. Springer Berlin Heidelberg, 2012. 199-217.
  • 10YANG K, JIA X, PEN K, et al. Enabling efficient access control with dynamic policy updating for big dam in the cloudA. 1NFOCOM, 2014 Proceedings IEEE[C]. 2014. 2013-2021.

同被引文献88

  • 1Boneh D, Di Crescenzo G, Ostrovsky R,et al. Public Key Encryption with Keyword Search[C]//Advances in Cryptology- Eurocrypt 2004. Springer Berlin Heidelberg, 2004 : 506-522. DOI: 10. 1007/978-3-540-69839-5 - 96.
  • 2Waters B R, Balfanz D,Durfee G,et al. Building an Encrypted and Searchable Audit Log[C]//NDSS. 2004,4: 5-6.
  • 3Back J, Safavi-Naini R, Susilo W. Public Key Encryption with Keyword Search Revisited[M]//Computational Science and Its Applications-ICCSA 2008. Springer Berlin Heidelberg,2008 : 1249-1259. DOI: 10. 1007/978-3-540-69839-5- 96.
  • 4Fang L,Susilo W,Ge C,et al. A Secure Channel Free Public Key Encryption with Keyword Search Scheme Without Ran- dom Oracle[M]//Cryptology and Network Security. Springer Berlin Heidelberg,2009:248-258. DOI: 10. 1007/978-3-642- 10433-6- 16.
  • 5Sahai A, Waters B. Fuzzy Identity-based Encryption[M]//Advances in Cryptology--EUROCRYPT 2005. Springer Berlin Heidelberg,2005:457-473. DOI:10. 1007/11426639 27.
  • 6Li J, Wang Q, Wang C, et al. Fuzzy Keyword Search Over Encrypted Data in Cloud Computing[C]//INFOCOM, 2010 Proceedings IEEE. IEEE, 2010 : 1-5. DOI: 10. 1109/INFCOM. 2010. 5462196.
  • 7Cao N ,Wang C, Li M, et al. Privacy-preserving Multi-keyword Ranked Search Over Encrypted Cloud Data[J]. Parallel and Distributed Systems,IEEE Transactions on,2014,25(1) :222-233. DOI:10. 1109/TPDS. 2013.45.
  • 8Li H W,Liu D X, Dai Y S, et al. Engineering Searchable Encryption of Mobile Cloud Networks:When QoE Ments QoP [J]. IEEE Wireless Communications, 2015,22(4) : 74-80. DOI: 10.1109/MWC. 2015. 7224728.
  • 9Guo L F, Yau W C. Efficient Secure-channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage [J]. Systems-Level Quality Improvement,2015,39(2) :0148-5598. DOI:10. 1007/s10916-014-0178-y.
  • 10Goyal V,Pandey O, Sahai A, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. Acm, 2006:89-98. DOI: 10. 1145/ 1180405. 1180418.

引证文献21

二级引证文献91

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部