期刊文献+

适应性安全的可追踪叛徒的基于属性加密方案 被引量:5

Adaptively secure attribute-based encryption for traitor tracing
下载PDF
导出
摘要 针对基于属性加密(ABE,attribute-base encryption)机制存在的密钥滥用问题,为每个用户增加唯一的身份标识符,将联合安全编码和叛徒追踪机制引入到ABE方案中,给出适应性安全的可追踪叛徒ABE的定义、安全模型和可追踪模型,提出一种适应性安全的可追踪叛徒的ABTT方案,该方案允许适应性追踪指定策略盗版解码器中的叛徒。基于合数阶群上的子群判定假设和DDH假设,证明所提方案是适应性安全和适应性可追踪的。因此,所提方案不仅可以适应性追查指定策略盗版解码器中的叛徒,而且进一步增强了ABE系统的安全性,具有一定的理论和应用价值。 For the key abuse problem in attribute-based encryption(ABE), each user was identified by his unique identity, and the collusion secure codes and the traitor tracing mechanism were introduced to the ABE scheme. The definition, security model and tracing model for adaptively secure attribute-based encryption for traitor tracing(ABTT)were formalized, and an adaptively secure ABTT scheme was proposed, which may trace traitors in policy-specific pirate decorders. Under these subgroup decision assumptions in composite order groups and the DDH assumption, adaptively secure and can adaptively trace traitors were proved. Therefore, the scheme not only was capable of tracing adaptively traitors in policy-specific pirate decorders, but also further strengthens the security of ABE system, which has theoretical and practical values.
出处 《通信学报》 EI CSCD 北大核心 2016年第1期76-87,共12页 Journal on Communications
基金 国家自然科学基金资助项目(No.61402244 No.61272424 No.61202006 No.61272107 No.61202173 No.61103068) NSFC-微软亚洲研究院联合基金资助项目(No.60970155) 上海市优秀学科带头人计划基金资助项目(No.10XD1404400) 教育部博士点基金资助项目(No.20090072110035) 上海自然科学基金资助项目(No.13ZR1443100) 南通大学校级自然科学基金资助项目(No.15Z06)~~
关键词 基于属性加密 叛徒追踪 双系统加密 适应性安全 联合安全编码 attribute-based encryption traitor tracing dual system encryption adaptive security collusion secure code
  • 相关文献

参考文献13

  • 1SAHAI A, WATERS B. Fuzzy identity based encryption[C]//TheEUROCRYPT. Aarhus, Denmark, c2005: 457-473.
  • 2GOYAL V, PANDEY O,SAHAI A, et al. Attribute-based encryptionfor fine-grained access control of encrypted data[C]//The 13th ACMConference on Computer and Communication Security. Alexandria,Virginia, USA, c2006: 89-98.
  • 3HINEK M J, JIANG S,SAFAVI-NAINI R, et al. Attribute-basedencryption with key cloning protection[EB/OL]. http://eprint.iacr.org/2008/478.pdf.
  • 4马海英,曾国荪.可追踪并撤销叛徒的属性基加密方案[J].计算机学报,2012,35(9):1845-1855. 被引量:12
  • 5WANG Y T, CHEN K F,CHEN J H. Attribute-based traitor tracing[J].Journal of Information Science and Engineering, 2011,27(1):181-195.
  • 6LI J,REN K, KIM K. A2BE: accountable attribute-based encryption forabuse free access control[EB/OL]. htQ)://q)rint.iacr.org/2009/ 118.pdf.
  • 7YU S C, REN K, LOU W J, et al. Defending against key abuseattacks in KP-ABE enabled broadcast system[C]//The Security andPrivacy in Communication Networks. Athens, Greece, c2009:311-329.
  • 8BONEH D, SHAW J. Collusion-secure fingerprinting for digitaldata[C]//The CRYPTO’95. Santa Barbara, California, USA, cl995:452-465.
  • 9ABDALLA M,DENT A W, MALONE-LEE J, et al. Identity-basedtraitor tracing[CJ//The public Key Cryptography. Beijing, China,C2007: 298-314.
  • 10LIU Z,CAO Z, WONG D S. Blackbox traceable CP-ABE: how tocatch people leaking their keys by selling decryption devices oneBay[C]//The 20th Conference on Computer and Communication Se-curity. Berlin, Germany,c2013: 475-486.

二级参考文献20

  • 1Sahai A, Waters B. Fuzzy identity based encryption//Pro- ceedings of the EUROCRYPT 2005. Aarhus, Denmark, 2005 : 457-473.
  • 2Goyal V, Pandey O, Sahai A, Waters B. Attribute-based en- cryption for fine-grained access control of encrypted data//Pro ceedings of the 13th ACM Conference on Computer and Com- munication Security. Alexandria, VA, USA, 2006:89-98.
  • 3Betheneourt J, Sahai A, Waters B. Ciphertext-policy attrib- ute-based encryption//Proceedings of the 2007 IEEE Sympo- sium on Security and Privacy. Washington, USA, 2007: 321-334.
  • 4Traynor P, Butler K, Enck W, Mcdaniel P. Realizing mas sive-scale conditional access systems through attribute-based cryptosystems//Proceedings of the 15th NDSS 2008. San Diego, USENIX Association, 2008:1-13.
  • 5Yu S C, Ren K, Lou W J. Attribute-based content distribu tion with hidden policy//Proceedings of the 4th Workshop on Secure Network Protocols. Orlando, 2008: 39-44.
  • 6Lewko A, Okarnoto T, Sahai A, Takashima K, Waters B. Fully secure functional encryption: Attribute-based encryp- tion and (hierarchical) inner product encryption//Proceed ings of the EUROCRYPT 2010. Monaco, 2010: 62-91.
  • 7Hinek M J, Jiang S, Safavi-Naini R, Shahandashti S F. Attribute-based encryption with key cloning protection. Cryptology ePrint Archive: Report 2008/478, 2008.
  • 8Yu S C, Ren K, Lou W J, Li J. Defending against key abuse attacks in KP ABE enabled broadcast system//Proceedings of the Security and Privacy in Communication Networks. Athens, Greece, 2009:311-329.
  • 9Li J, Ren K, Zhu B, Wan Z G. Privacy aware attribute- based encryption with user accountability//Proceedings of the Information Security Conference :?009. 2009:347-362.
  • 10Wang Y T, Chen K F, Chen J H. Attribute based traitor tracing. Journal of Information Science and Engineering, 2011, 27(1): 181-195.

共引文献11

同被引文献25

引证文献5

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部