期刊文献+

基于属性的环签密方案在PHR云中的应用 被引量:1

Application of Attribute-based Ring Signcryption Scheme in Personal Health Record Cloud
下载PDF
导出
摘要 由于医疗数据和病人身份的敏感性,要求同时保证病人的医疗数据安全和身份信息不被泄露。现有方案满足匿名性要求,但拥有互补属性的用户可以合谋、且密文长度过长。针对上述问题,提出一种基于属性的抗合谋攻击的短密文环签密方案。该方案采用基于属性的环签密,保护了共享数据的机密性且隐藏用户的真实身份。其安全性可规约为CDH困难问题和DBDH困难问题。性能分析结果表明,与传统环签密方案相比,该方案能够抵抗合谋攻击且密文较短,具有更高的安全性和实现效率。 Due to the sensitivity of medical data and the identity of the patient,it is required to ensure the security of the patient’s medical, and ensure the patient’s identity information is not leak. Existing schemes meet requirements,but the users with the complementary attributes can conspire and the ciphertext is long. In order to solve these problems,a new attribute-based and short ciphertextring signcryption scheme is presented,the scheme uses attribute-based ring signcryption,which protects the confidentiality of sharing data and conceals user’real identity,which security is proven equivalent to the CDH and DBDH problems. Performance analysis results show that, compared with existing schemes,the new scheme is able to resist conspiracy attacks and the ciphertext is short, so it has higher security and efficiency.
出处 《计算机工程》 CAS CSCD 北大核心 2017年第9期172-178,共7页 Computer Engineering
基金 国家自然科学基金(61662071 61462077 61562077) 西北师范大学青年教师科研提升计划项目(NWNU-LKQN-14-1)
关键词 基于属性签密 环签密 合谋攻击 匿名性 DIFFIE-HELLMAN假设 拉格朗日插值 attribute-based signcryption ring signcryption conspiracy attack anonymity Diffie-hellman assumption Lagrange interpolation
  • 相关文献

参考文献3

二级参考文献43

  • 1黄欣沂,张福泰,伍玮.一种基于身份的环签密方案[J].电子学报,2006,34(2):263-266. 被引量:17
  • 2彭长根,李祥,罗文俊.一种面向群组通信的通用门限签密方案[J].电子学报,2007,35(1):64-67. 被引量:14
  • 3Sahai A,Waters B.Fuzzy identity-based encryption[G]//LNCS 3494:Proc of EUROCRYPT'05.Berlin:Springer,2005:457-473.
  • 4Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proc of the 13th ACM Conf on Computer and Communications Security.New York:ACM,2006:89-98.
  • 5Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]//Proc of IEEE Symp on Security and Privacy.New York:ACM,2007:321-334.
  • 6Cheung L,Newport C.Provably secure ciphertext policy ABE[C]//Proc of the 14th ACM Conf on Computer and Communications Security.New York:ACM,2007:456-465.
  • 7Goyal V,Jain A,Pandey O,et al.Bounded ciphertext policy attribute-based encryption[G]//LNCS 5126:Proc of the 35th Int Colloquium on Automata,Languages and Programming.Berlin:Springer,2008:579-591.
  • 8Khader D.Attribute based group signatures[OL].(2008-01-12)[2010-05-08].http://eprint.iacr.org/2007/159.
  • 9Hahandashti S F,Safavi-Naini R.Threshold attribute-based signatures and their application to anonymous credential systems[G]//LNCS 5580:Progress in Cryptology-AFRICACRYPT 2009.Berlin:Springer,2009:198-216.
  • 10Li J,Kim K.Attribute-based ring signatures[OL].(2008-09-16)[2010-05-08].http://eprint.iacr.org/2008/394.

共引文献13

同被引文献15

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部