期刊文献+

支持通用电路的多线性映射外包属性加密方案 被引量:1

Outsourced attribute-based encryption for general circuit from multilinear maps
下载PDF
导出
摘要 针对基于多线性映射的属性加密方案存在密文扩展率大、解密效率低、密钥托管的问题,将外包技术和用户秘密值法运用于方案中,设计了一个密钥策略的多线性映射属性加密方案。方案以通用多项式电路作为访问结构,支持任意扇出,其用户的私钥由密钥生成中心和用户共同产生。密文长度固定为|G|+|Z|,按照椭圆曲线标准设置合理参数后,与已知密文量最小的方案对比,存储代价减少25%。用户解密时仅对转换密文作运算,且外包正确性可验证,解密所需多线性运算次数仅为3次,大大降低了用户的计算代价。在标准模型下利用多线性判断DiffieHellman困难问题证明了方案的安全性。该方案也能适用于运算能力有限的小型移动设备。 Since the ciphertext length of attribute-based encryption scheme from multilinear maps is large, the decryption is inefficient and the scheme has key escrow problem, a key-policy attribute-based encryption scheme from multilinear maps was proposed by using outsourcing technology and user's secret value. The proposed scheme supported general polynomial-size circuit and arbitrary fanout, the private key was generated by key generation center and user. The length of the ciphertext is fixed to |G|+|Z|, compared with the known ciphertext scheme with the minimum ciphertext, the storage cost is decreased by 25% after setting reasonable parameters in accordance with the standards elliptic curves. Users only need to compute transformation ciphertext and the ciphertext is verifiable. The decryption multilinear operation count is only 3, which greatly reduces the computional cost. Selective security is proved in standard model under the multilinear decisional Diffie-Hellman problem. Additionally, it also can be applied in small mobile devices with limited computing capability.
出处 《计算机应用》 CSCD 北大核心 2016年第10期2747-2752,2757,共7页 journal of Computer Applications
基金 国家自然科学基金资助项目(61572521 61272492 61272468) 陕西省自然科学基础研究计划项目(2015JM6353)~~
关键词 属性加密 多线性映射 通用电路 可验证外包 attribute-based encryption multilinear map general circuit verifiable outsourcing
  • 相关文献

参考文献25

  • 1SHAMIR A . Identity - based cryptosysterns mad signature schemes [ C]// Crypto 1984: Proceedings of CRYPTO 1984 on Advances in Cryptology. Berlin: Springer, 1985:47-53.
  • 2GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryp- tion for fine grained access control of encrypted data [ C]// CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006:89 -98.
  • 3张星,文子龙,沈晴霓,方跃坚,吴中海.可追责并解决密钥托管问题的属性基加密方案[J].计算机研究与发展,2015,52(10):2293-2303. 被引量:11
  • 4BONEH D, SILVERBERG A. Applications of muhilinear forms to cryptography [ J]. Contemporary Mathematics, 2003, 324(1) : 71 -90.
  • 5GARG S, GENTRY C, HALEVI S. Candidate muhilinear nmps from ideal lattices [ C]// EUROCRYPT 2013: Proceedings of the 32nd Annual International Conference on the Theory and Applica- tions of Cryptographic Techniques, LNCS 7881. Berlin: Springer, 2013: 1-17.
  • 6YE D F, LIU P. Obfuscation without multilinear maps [ EB/OL]. [2016-02-201. http://eprint, iacr. org/2016/095, pdf.
  • 7CORON J S , LEPOINT T , TIBOUCHI M . Practical muhilinear maps over the integers [ C]// CRYPTO 2013: Proceedings of the 33rd Annual Cryptology Conference, LNCS 8042. Berlin: Springer, 2013:476-493.
  • 8GU C S. Variation of GGH14 multilinear maps[ EB/OL]. [ 2016- 02-201. http://eprint, iacr. org/2015/1245, pdf.
  • 9CORON J S, LEPOINT T, TIBOUCHI M. New muhilinear maps o- ver the integers [ C]// CRYFFO 2015: Proceedings of the 35th An- nual Cryptology Conference, LNCS 9215. Berlin: Springer, 2015: 267 - 286.
  • 10GARG S, GENTRY C, HALEVI S, et al. Attribute-based encryp- tion for circuits from multilinear maps [ C]//CRYPTO 2013: Pro-ceedings of the 33rd Annual Cryptology Conference on Advances in Cryptology, LNCS 8043. Berlin: Springer, 2013:479-499.

二级参考文献69

  • 1Sahai A,Waters B.Fuzzy identity-based encryption[C]//Cramer R.Advances in Cryptology-EUROCRYPT 2005.Berlin,Heidelberg:Springer-Verlag,2005:457-473.
  • 2Herranz J,Laguillaumie F,Rafols C.Constant-size cipher-texts in threshold attribute-based encryption[C]//Nguyen PQ,Pointcheval D.PKC 2010,LNCS 6056:19-34.
  • 3GeAijun,Zhang Rui,Chen Cheng,et al.Threshold cipher-text policy attribute-based encryption with constant size ci-phertexts[C]//Information Security and Privacy.2012,LNCS 7372:336-349.
  • 4Agrawal S,Boyen X,Vaikuntanathan V,et al.Functional en-cryption for threshold functions (or Fuzzy IBE) from lattices[C]//Public Key Cryptography-PKC 2012.2012,LNCS7293:280-297.
  • 5SunChangxia,Ma Wenping.Secure attribute-based thresholdsignature without a trusted central authority[J].Jouml ofComputers,2012,7( 12):2899-2905.
  • 6Goyal V,Pandey 0,Sahai A,et al.Attribute-based encryp-tion for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer andCommunications Security.New York:ACM Press,2006:89Ostrovsky R,Sahai A,Waters B.Attribute-based encryptionwith non-monotonic access structures[C]//Proceedings ofthe ACM Conference on Computer and Communications Se-curity-New York:ACM Press,2007; 195-203.
  • 7Waters B.Ciphertext-policy attribute-based encryption:Anexpressive,efficient,and provably secure realization[C]//Catalano D,Catalano N.Procedings of the Public Key Cryp-tography ( PKC 2011).Berlin:Springer-Verlag,2011:53-70.
  • 8Chen Cheng,Chen Jie,Lim Hoonwei,et al.Combined pub-lic-key schemes:The case of ABE and ABS[C]//ProvSec2012.2012,LNCS 7496:53-69.
  • 9Sahai A,Seyalioglu H,Waters B.Dynamic credentials andciphertext delegation for attribute-based encryption[C]//Advances in Cryptology-CRYPTO 2012.2012,LNCS7417:199-217.
  • 10Garg S,Gentry C,Halevi S,et al.Attribute-based encryp-tion for circuits from multilinear maps[G]//Advances inCryptology-CRYPTO,2013.2013,LNCS 8043:479-499.

共引文献28

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部