期刊文献+

无中央授权中心的属性基加密云端储访问控制方案 被引量:3

Multi-authority ABE Without Central Authority for Access Control Scheme in Cloud Storage
下载PDF
导出
摘要 针对多授权属性基加密云存储访问控制方案中的安全性和有效性问题,提出一种无中央授权中心的多授权属性加密的云存储访问控制方案.利用分布式密钥生成协议,多个授权中心联合分发用户的属性密钥;采用线性秘密共享方案,支持灵活的访问控制策略;引入代理重加密和解密外包技术,将大部分计算任务委托给云服务器执行,实现用户的即时撤销,有效降低用户的计算开销.分析结果表明,新方案在文件加密和文件解密上具有较高的性能,并且在q-BDHE假设下是自适应性安全的. In order to improve the security and efficiency of multi-authority attribute-based encryption access control scheme for cloud storage,a multi-authority attribute-based encryption without central authority for access control scheme in cloud storage is presented. In the proposed scheme, multiple attribute authority jointly distribute the user's key by using the distributed key generation protocol. This scheme can support flexible access control policy through linear secret sharing scheme. Furthermore, by introducing proxy re-encryp- tion and decryption outsourcing technology,the majority of computing tasks entrusted to the cloud server to perform. Hence,it can re- alize on-demand attribute revocation of user and effectively reduce the computational overhead of users. The results show that this scheme has high performance on encryptiort/decryption operations. It is adaptively secure under q-BDHE assumption.
出处 《小型微型计算机系统》 CSCD 北大核心 2017年第4期826-829,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61662069 61262057)资助 甘肃省科技计划项目(145RJDA325)资助 国家档案局科技项目计划项目(2014-X-33)资助 兰州市科技计划项目(2013-4-22)资助 甘肃省高校科研项目(2014-A011)资助 西北师范大学青年教师科研能力提升计划项目(NWNU-LKQN-14-7)资助
关键词 多授权属性加密 云存储 访问控制 重加密 中央授权 multi-authority attribute-based encryption cloud storage access control re-encryption central authority
  • 相关文献

参考文献4

二级参考文献45

  • 1Sahai A,Waters B.Fuzzy identity based encryption[C]//Proceedings of the Eurocrypt.Berlin Heidelberg:Springer,2005:457-473.
  • 2Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communication Security.[S.l.]:ACM,2006:89-98.
  • 3Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy,2007:321-334.
  • 4Chase M.Multi-authority attribute based encryption[C]//Proceedings of Theory of Cryptography.Berlin Heidelberg:Springer,2007:515-535.
  • 5Pirretti M,Traynor P,Mcdaniel P,et al.Secure attributebased systems[J].Journal of Computer Security,2010,18(5):799-837.
  • 6Ostrovsky R,Sahai A,Waters B.Attribute-based encryption with non-monotonic access structures[C]//Proceedings of the 14th ACM Conference on Computer and Communication Security.[S.l.]:ACM,2007:195-203.
  • 7Attrapadung N,Imai H.Conjunctive broadcast and attributebased encryption[C]//Proceedings of the Pairing-Based Cyptography-Pairing.Berlin Heidelberg:Springer,2009:248-265.
  • 8Lin Huang,Cao Zhenfu,Liang Xiaohui.Secure threshold multi-authority attribute based encryption without a central authority[J].Information Sciences,2010,180(13):2618-2632.
  • 9Chase M,Chow S S M.Improving privacy and security in multiauthority attribute-based encryption[C]//Proceedings of the ACM Conference on Computer and Communications Security.[S.l.]:ACM,2009:121-130.
  • 10Lewko A,Waters B.Decentralizing attribute-based encryption[C]//Eurocrypt 2011.Berlin Heidelberg:Springer,2011:568-588.

共引文献41

同被引文献20

引证文献3

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部