期刊文献+

素数阶群上具有扩展通配符的ABE方案

ABE Scheme with Generalized Wildcards on Prime Order Groups
下载PDF
导出
摘要 叛徒追踪和撤销是基于属性的加密(ABE)在实际应用中需要解决的问题,具有扩展通配符的ABE方案(GWABE)能够方便地解决上述问题。目前自适应安全的GWABE方案均在合数阶群上构造。针对合数阶上双线性映射计算开销过大的问题,以对偶正交基技术为基础,提出了一种素数阶群上自适应安全的GWABE方案,同时将该方案的安全性归约到判定性线性假设。性能分析表明,该方案在达到自适应安全的基础上,具有更好的效率。 Traitor tracing and revocation are crucial to use of ABE.ABE scheme with generalized wildcards(GWABE)is a convenient way for solving these problems.Previous adaptively secure GWABE scheme suffers from superfluous computation overhead because they are designed on composite order groups.To tackle this problem,an adaptively secure GWABE scheme on prime order groups was proposed when a dual pairing vector space approach was employed.The proposed scheme is proven adaptively secure from the decisional linear assumption.Performance analysis indicates that this scheme is more efficient while achieving the adaptive security.
机构地区 信息工程大学
出处 《计算机科学》 CSCD 北大核心 2016年第1期186-190,210,共6页 Computer Science
基金 国家重点基础研究发展计划(973计划)项目(2011CB311801)资助
关键词 基于属性的加密 叛徒追踪 撤销 自适应安全 素数阶 Attribute-based encryption Traitor tracing Revocation Adaptive security Prime order
  • 相关文献

参考文献19

  • 1Sahai A, Waters B. Fuzzy identity-based eneryption[C]//EU ROCRYPT 2005. Berlin: Springer, 2005 : 457-473.
  • 2Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [ C] // CCS2006. Alexandria, Virginia: ACM, 2006 : 89-98.
  • 3Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute based encryption[C]//IEEE Symposium on Security and Priva cy 2007. Berkeley, CA: IEEE, 2007:321-334.
  • 4Hinek J, Jiang S, Safari R, et al. Attribute-Based Encryption with Key Cloning Protection:Report 2008/478[R]. 2008.
  • 5Yu Shu-cheng, Ren Kui, Lou Wen-jing, et al. Defending Against Key Abuse Attacks in KPABE Enabled Broadcast Systems[C]// Proceedings of the Security and Privacy in Communication Net- works. Athens, Greece, 2009 .. 311-329.
  • 6Li Jin, Ren Kui, Zhu I3o, et al. Privacy-aware Attribute-based Encryption with User Accountability[C] // Proceedings of the Information Security Conference 2009. 2009:347-362.
  • 7Wang Yontao, Chen Ke-fei, Chen Jian-hong. Attribute-Based Traitor Tracing [J]. Journal of Information Science and Engi- neering, 2011,27(1): 181-195.
  • 8Ostrovsky R, Sahai A, Waters B. Attribute Based Encryption with Non-Monotonic Access Structures[C]//Proceedings of the 14th ACM Conference on Computer and Communication Securi- ty. Alexandria, New York, USA, 2007 .. 195-203.
  • 9Attrapadung N, Imai H. Conjunctive broadcast and attribute- based encryption[C] // Proceedings of the Pairing-Based Cryp- tography-Pairing 2009. Palo Alto, USA, 2009:248-265.
  • 10Waters B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions[C] // Advances in Cryptology- CRYPTO 2009. Springer Berlin Heidelberg,2009..619-636.

二级参考文献22

  • 1Sahai A, Waters B. Fuzzy identity based encryption//Pro- ceedings of the EUROCRYPT 2005. Aarhus, Denmark, 2005 : 457-473.
  • 2Goyal V, Pandey O, Sahai A, Waters B. Attribute-based en- cryption for fine-grained access control of encrypted data//Pro ceedings of the 13th ACM Conference on Computer and Com- munication Security. Alexandria, VA, USA, 2006:89-98.
  • 3Betheneourt J, Sahai A, Waters B. Ciphertext-policy attrib- ute-based encryption//Proceedings of the 2007 IEEE Sympo- sium on Security and Privacy. Washington, USA, 2007: 321-334.
  • 4Traynor P, Butler K, Enck W, Mcdaniel P. Realizing mas sive-scale conditional access systems through attribute-based cryptosystems//Proceedings of the 15th NDSS 2008. San Diego, USENIX Association, 2008:1-13.
  • 5Yu S C, Ren K, Lou W J. Attribute-based content distribu tion with hidden policy//Proceedings of the 4th Workshop on Secure Network Protocols. Orlando, 2008: 39-44.
  • 6Lewko A, Okarnoto T, Sahai A, Takashima K, Waters B. Fully secure functional encryption: Attribute-based encryp- tion and (hierarchical) inner product encryption//Proceed ings of the EUROCRYPT 2010. Monaco, 2010: 62-91.
  • 7Hinek M J, Jiang S, Safavi-Naini R, Shahandashti S F. Attribute-based encryption with key cloning protection. Cryptology ePrint Archive: Report 2008/478, 2008.
  • 8Yu S C, Ren K, Lou W J, Li J. Defending against key abuse attacks in KP ABE enabled broadcast system//Proceedings of the Security and Privacy in Communication Networks. Athens, Greece, 2009:311-329.
  • 9Li J, Ren K, Zhu B, Wan Z G. Privacy aware attribute- based encryption with user accountability//Proceedings of the Information Security Conference :?009. 2009:347-362.
  • 10Wang Y T, Chen K F, Chen J H. Attribute based traitor tracing. Journal of Information Science and Engineering, 2011, 27(1): 181-195.

共引文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部