期刊文献+

一种新的密码学原语研究——流程加密 被引量:3

New Cryptography Primitive Research: Process Based Encryption
下载PDF
导出
摘要 在许多实际的应用场景中,当用户需要获取敏感数据时,需要判断该用户是否满足某些"流程"的要求.现存的加密方案不能有效应用到以上场景中.为了解决这一新问题,提出了一种新的加密原语:基于流程的加密(process based encryption,简称PBE),并把PBE分成两种类型:密钥策略的PBE(KP-PBE)与密文策略的PBE(CP-PBE).运用双线性映射与线性秘密共享协议的工具,给出了一种KP-PBE的构造方法.随后,把KP-PBE方案与传统属性加密进行对比,指出在描述流程数量方面,KP-PBE与传统属性加密方案存在数量级的差异,从而体现了KP-PBE方案在描述流程方面的优越性.最后,在选择性安全的模型下,证明了该方案的安全性. In many applications, when a user needs to access sensitive information, it is a usual requirement to authenticate whether or not the user satisfies certain processes. Existing encryption schemes are not applicable for this scenario. To adderess this problem, a new cryptography primitive called process pased encryption (PBE) is presented. The application scenario of PBE is demonstrated. PBE is classified into two categories: Key policy process based encryption (KP-PBE) and ciphertext policy process based encryption (CP-PBE). A KP-PBE scheme is constructed utilizing the tools of bilinear map and linear secret sharing scheme (LSSS). Compared to conventional attribute based Eecryption (ABE), the performance of KP-PBE is much better on describing processes. Finally, the security of KP-PBE is proven under the selective security model.
作者 邓宇乔 唐春明 宋歌 温雅敏 DENG Yu-Qiao TANG Chun-Ming SONG Ge WEN Ya-Min(School of Mathematics and Statistics, Guangdong University of Finance and Economics, Guangzhou 510320, China School of Mathematics and Computer Science, Guangzhou University, Guangzhou 510006, China College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510120, China)
出处 《软件学报》 EI CSCD 北大核心 2017年第10期2722-2736,共15页 Journal of Software
基金 教育部人文社科研究项目(15YJCZH029) 广州市哲学社会科学发展"十三五"规划课题(2016GZYB25 2017GZQN 05) 国家自然科学基金(61772147 61300204) 广东省自然科学基金重大基础研究培育项目(2015A030308016) 广东省自然科学基金(2015A030313630) 广东省教育厅基础研究重大项目(2014KZDXM044) 广东省普通高校创新团队建设项目(2015KCXTD014) 国家密码发展基金(MMJJ20170117) 广州市教育局协同创新重大项目(1201610005) 上海市信息安全综合管理技术研究重点实验室开放课题基金(AGK2015007) 广东省科技计划(2016A020210103 2017A020208054)~~
关键词 流程加密 密钥策略 密文策略 属性加密 选择性安全模型 process based encryption key policy ciphertext policy attribute-based encryption selective security model
  • 相关文献

参考文献8

二级参考文献126

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2Dodis Y, Katz J, Xu S, Yung M. Key-Insulated public-key cryptosystem. In: Knudsen LR, ed. Proc. of the EUROCRYPT 2002 LNCS 2332, Heidelberg: Springer-Verlag, 2002.65-82. [doi: 10.1007/3-540-46035-7_5].
  • 3Hanaoka G, Hanaoka Y, Imai H. Parallel key-insulated public key encryption. In: Yung M, ed. Proc. of the PKC 2006. LNCS 3958 Heidelberg: Springer-Verlag, 2006. 105-122. [doi: 10.1007/11745853_8].
  • 4Hanaoka Y, Hanaoka G, Shikata J, lmai H. Identity-Based hierarchical strongly key-insulated encryption and its application. In: Roy B, ed. Proc. of the Asiacrypt 2005. LNCS 3958, Heidelberg: Springer-Verlag, 2006. 495-514. [doi: 10.1007/11593447 27].
  • 5Weng J, Liu S, Chen K, Ma C. Identity-Based parallel key-insulated encryption without random oracles: Security notions and construction. In: Barua R, Lange T, eds. Proc. of the Indocrypt 2006. LNCS 4329, Heidelberg: Springer-Verlag, 2006. 409-423. [doi: 10,I007/11941378_29].
  • 6Libert B, Quisquater J J, Yung M. Parallelkey-lnsulated public key encryption without random oracles. In: Okamoto T, Wang X, eds. Proc. of the PKC 2007. LNCS 4450, Heidelberg: Springer-Verlag, 2007. 298-314. [doi: 10.1007/978-3-540-71677-8_20].
  • 7Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Proc. of the Eurocrypt 2005. LNCS 3494, Heidelberg: Springer-Verlag, 2005. 457-473. [doi: 10.1007/11426639_27].
  • 8Goyal V, Pandey O, Saha A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. in: Wright R, Vimercati SDCD, eds. Proc. of the ACM CCS 2006. New York: ACM Press, 2006.89-98. [doi: 10.1145/1180405.1180418].
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Pfitzmann B, McDaniel P, eds. Proc. of the IEEE SP 2007. Los Angeles: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Cheung L, Newport C. Provably secure ciphertext policy ABE. In: Vimercati SDCD, Syverson P, eds. Proc. of the ACM CCS 2007. New York: ACM Press, 2007. 456-465. [doi: 10.1145/1315245.1315302].

共引文献148

同被引文献15

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部