期刊文献+

多授权机构属性基加密方案研究与应用

Research and application of multi-authority attribute-based encryption scheme
下载PDF
导出
摘要 目前多授权机构基于属性的加密方案(MA-ABE)限制每个属性在访问结构中只能出现一次,属性重复编码将导致系统效率降低,为此提出一种自适应安全的属性可重复的MA-ABE方案(AP-MA-ABE)。该方案在标准模型下是自适应安全的,将其应用到云存储系统中,实现在服务提供商不可信前提下,由数据提供者定义数据的访问控制策略,保证数据的安全性。性能分析结果表明,当加密使用的访问结构中出现1次属性重复时,该方案密文长度和解密速度与现有MAABE方案相当,当出现多次属性重复时,该方案具有优势。 Previous multi-authority attribute-based encryption(MA-ABE)schemes limit each attribute to appear only once in the access structure and they suffer from superfluous computation overhead on repetitive encoding technique.To solve this problem,an adaptively secure and attribute repeatable multi-authority ABE(AP-MA-ABE)scheme was proposed and verified to be adaptively secure in the standard model.Through applying this scheme in cloud storage system,the security of data was ensured by the access control policy which defined by data provider,on the premise of incredible service provider.Performance analysis indicates that the sizes of ciphertext and the pairing computation of decryption using this scheme are equal to the previous MA-ABE scheme when one attribute appears twice in the access structure,while this scheme is more efficient when more attributes repeat in the access structure.
出处 《计算机工程与设计》 北大核心 2016年第8期1981-1985,共5页 Computer Engineering and Design
基金 国家973重点基础研究发展计划基金项目(2011CB311801)
关键词 云存储 访问控制 属性基加密 多授权机构 属性可重复 自适应安全 cloud storage access control attribute-based encryption multi-authority attribute repeatable adaptively secure
  • 相关文献

参考文献4

二级参考文献45

  • 1王连强,张剑,吕述望,刘振华.一种基于密码的层次访问控制方案及其分析[J].计算机工程与应用,2005,41(33):7-10. 被引量:2
  • 2张淼,徐国爱,胡正名,杨义先.可信计算环境下基于主机身份的一次性密钥交换协议[J].电子与信息学报,2007,29(6):1348-1351. 被引量:2
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1180

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部