期刊文献+

可验证的固定密文长度属性基加密方案

Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length
下载PDF
导出
摘要 基于属性的加密技术的一个主要缺点不得不被重视:解密计算代价随着访问结构的复杂性线性增长。通过使用代理重加密技术,基于属性的外包解密系统可以很大程度上降低用户想要访问以密文形式存储在云上的数据的计算代价。文中提出了一个新的可验证的具有固定密文长度的外包解密属性基加密方案。 One of attribute-based encryption( ABE) technology's main performance challenges is that the complexity of decryption computation is linearly correlated with the access structure. By using the proxy re-encryption technology,outsourced decryption ABE system can largely reduce the computation cost for users who intend to access the encrypted files stored in cloud. This paper proposed a new verifiable outsourcing scheme with constant ciphertext length.
出处 《信息技术》 2016年第3期121-124,共4页 Information Technology
关键词 基于属性的加密 云计算 固定密文长度 外包解密 可验证性 attribute-based encryption cloud computing constant ciphertext length outsourced decryption verifiability
  • 相关文献

参考文献25

  • 1Boneh D,Franklin M.Identitybased encryption from the Weil pairing[J].Advances in Cryptology-CRYPTO 2001-21st Annual International Cryptology Conference,Joe Kilian,ed.,Lecture Notes in Computer Science,Berlin:Springer-Verlag,2001:213-229.
  • 2Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C].Proceedings of the13th ACM Conference on Computer and Communications Security,2006:89-98.
  • 3Li J W,Jia C F,Li J,et al.Outsourcing encryption of attribute-based encryption with Mapreduce[C].Information and Communications Security-14th International Conference,ICICS 2012,T.WingChim,T.Hon-Yuen,eds.,Lecture Notes in Computer Science,Berlin:Springer-Verlag,2012,7618:191-201.
  • 4Lewko A,Waters B.Unbounded HIBE and attribute-based encryption[C].Advances in Cryptology-EUROCRYPT 2011-30th Annual International Conference on the Theory and Applications of Cryptographic Techniques,K.G.Paterson,ed.,Lecture Notes in Computer Science,Berlin:Springer-Verlag,2011,6632:547-567.
  • 5Canetti R,Krawczyk H,Nielsen J B.Relaxing chosen-ciphertext security[C].Advances in Cryptology-CRYPTO 2003-23rd Annual International Cryptology Conference,D.Boneh,ed.,Lecture Notes in Computer Science,Berlin:Springer-Verlag,2003,2729:565-582.
  • 6Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C].IEEE Symposium on Security and Privacy,May2007:21-334.
  • 7Fu X B,Wu Z F.Ciphertext policy attribute based encryption with immediate attribute revocation for fine-grained access control in cloud storage[C].Communications,Circuits and Systems(ICCCAS),2013 International Conference,2013,2:103-108.
  • 8Waters B.Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[C].Public Key Cryptography-PKC 2011-14th International Conference on Practice and Theory in Public Key Cryptography,D.Catalano,N.Fazio,R.Gennaro,A.Nicolosi,eds.,Lecture Notes in Computer Science,Berlin:Springer-Verlag,2011,6571:53-70.
  • 9Okamoto T,Takashima K.Fully secure functional encryption with general relations from the decisional linear assumption[C].Advances in Cryptology-CRYPTO 2010-30th Annual Cryptology Conference,Santa Barbara,T.Rabin,ed.,Lecture Notes in Computer Science,Berlin:Springer-Verlag,2010,6223:191-208.
  • 10Cheung L,Newport C.Provably secure ciphertext policy ABE[C].Proceedings of the 14th ACM Conference on Computer and Communications Security,2007:456-465.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部