期刊文献+

具有两个可撤销属性列表的密钥策略的属性加密方案 被引量:5

Revocable Key-policy Attribute-based Encryption Scheme with Two Revocation Lists
下载PDF
导出
摘要 可撤销的属性加密方案是属性加密方案的延伸和扩展。该文构造了细粒度属性撤销下的具有两个可撤销属性列表的密钥策略的属性加密方案,该方案是对含有单个属性撤销列表方案的推广,新方案涉及两个属性撤销列表,允许两个列表中被撤销用户存在交集或者无关,同时利用追踪算法,判定了用户与私钥的关联性。在选择安全模型下证明了方案的安全性,将方案的安全性规约到求解判定性双线性Diffie-Hellman指数问题上。 Revocable attribute-based encryption is an extension and generalization of attribute-based encryption. In this paper, a revocable key-policy attribute-based encryption scheme is constructed with two revocation lists, it extends a previous scheme which is designed with only one attribute revocation list, and in the new scheme two attribute revocation lists are involved, and the two lists are independent with each other. What's more, the new scheme enjoys an important property that the trace algorithm return the user associated with this decryption key. Finally, under the assumption of decisional Bilinear Diffie-Hellman Exponent(BDHE), the proposed scheme is proved that is secure in the selective security model.
出处 《电子与信息学报》 EI CSCD 北大核心 2016年第6期1406-1411,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61173192 61572019) 2014年度西安市碑林区科技计划(GX1407) 陕西省自然科学基础研究计划-重点项目(2016JZ001)~~
关键词 属性加密 密钥策略 双线性映射 撤销 Attribute-based encryption Key policy Bilinear maps Revocation
  • 相关文献

参考文献16

  • 1SAHAI A and WATERS B. Fuzzy identity-based encryption [J]. Lecture Notes in Computer Science, 2005, 3494: 457-473. doi: 10.1007/11426639_27.
  • 2YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[C]. ACM Symposium on Information, ACM, 2010: 261-270. doi: 10.1145/1755688. 1755720.
  • 3PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure attribute-based systems[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006: 99-112.
  • 4BOLDYREVA A, GOYAL V, and KUMAR V. Identity- based encryption with efficient revocation[C]. Proceedings of the 15th ACM Conference on Computer and Communications Security, New York, 2008: 417-426.
  • 5HINEK M J, JIANG S, SAFAVI-NAINI R, et al. Attribute- based encryption with key cloning protection[J]. Bulletin of the Korean Mathematical Society, 2008, 2008(4): 803-819.
  • 6LI J, REN K, and KIM K. A2BE: Accountable attribute- based encryption for abuse free access control[J]. IACR Cryptology ePrint Archive, 2009: 118.
  • 7ATTRAPADUNG N and IMAI H. Conjunctive broadcast and attributebased encryption[C]. Lecture Notes in Computer Science, 2009, 5671: 248-265. doi: 10.1007/ 978-3-642-03298-1 16.
  • 8LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[C]. Advances in Cryptology-EUROCRYPT 2010, Springer Berlin Heidelberg, 2010, 6110: 62-91. doi: 10.1007/978-3-642-13190-5_4.
  • 9VLADIMIR B, DANIEL S, STEINWANDT R, et al. Multi-authority attribute-based encryption with honest-but- curious central authority[J]. International Journal o] Computer Mathematics, 2011, 89(3): 268-283.
  • 10LI Q, FENG D, and ZHANG L. An attribute based encryption scheme with fine-grained attribute revocation[C]. Global Communications Conference (GLOBECOM), 2012 IEEE, Anaheim, CA, 2012: 885-890. doi: 10.1109/GLOCOM 2012.6503225.

二级参考文献26

  • 1Sahai A and Waters B. Fuzzy identity-based encryption[C]. EUROCRYPT 2005, Aarhus, Denmark, May 22-26, 2005,LNCS 3494: 457-473.
  • 2Lewko A and Waters B. Decentralizing attribute-based encryption [C]. EUROCRYPT 2011, Tallinn, Estonia, May15-19, 2011, LNCS 6632: 568-588.
  • 3Yamada S, Attrapadung N, Hanaoka G, et al.. Generic constructions for chosen-ciphertext secure attribute based encryption[C]. PKC 2011, Taormina, Italy, March 6-9, 2011, LNCS 6571: 71-89.
  • 4Maji H K, Prabhakaran M, and Rosulek M. Attribute-based signatures [C]. CT-RSA 2011, San Francisco, CA, USA, February 14-18, 2011, LNCS 6558: 376-392.
  • 5Ateniese G, Kirsch J, and Blanton M. Secret handshakes with dynamic and fuzzy matching [C]. NDSS 2007, San Diego, California, USA, February 28-March 2, 2007: 159-177.
  • 6Wang H, Xu Q, and Ban T. A provably secure two-party attribute-based key agreement protocol [C]. IIH-MSP 2009, Kyoto, Japan, September 12-14, 2009: 1042-1045.
  • 7Birkett J and Stebila D. Predicate-based key exchange [C]. ACISP 2010, Sydney, Australia, July 5-7, 2010, LNCS 6168: 282-299.
  • 8Yoneyama K. Strongly secure two-pass attribute-based authenticated key exchange [C]. Paring 2010, Yamanaka Hot Spring, Japan, December 13-15, 2010, LNCS 6487: 147-166.
  • 9Waters B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization [C]. PKC 2011, Taormina, Italy, March 6-9, 2011, LNCS 6571: 53-70.
  • 10LaMacchia B, Lauter K, and Mityagin A. Stronger security of authenticated key exchange [C]. ProvSec 2007, Wollongong, Australia, October 31-November 2, 2007, LNCS 4784: 1-16.

共引文献21

同被引文献19

引证文献5

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部