期刊文献+

支持策略隐藏的多授权机构属性基加密方案

Multi-authority Attribute-based Encryption Scheme with Policy Hiding
下载PDF
导出
摘要 现有隐藏策略的属性基加密方案大多针对单个属性授权机构,没有考虑到用户属性由多个授权机构管理的情况,存在密钥生成效率低、机构本身易被攻破、无法满足云存储环境安全需求的问题。为此,提出一种多授权机构属性基加密方案。通过对访问结构进行改进,实现访问策略的完全隐藏,进而保护用户隐私。用户私钥由数据属主和多个属性授权机构共同生成,可提高密钥生成效率,并抵抗非法用户及授权机构的合谋攻击。基于判定性双线性Diffie-Hellman假设,证明方案在标准模型下是选择明文安全的。实验结果表明,该方案可有效提高密钥生成及加解密效率。 Most existing attribute-based encryption schemes of hidden policies are directed to a single authority,without taking into account the situation where the users' attributes are managed by multi-authority, having the problems such as low-efficient of key generation, single authority easy to be broken through and requirement of environmental security inconsistent with cloud storage. Therefore, a multi-authority Attribute-based Encryption (ABE) scheme is put forward. This scheme realizes complete concealment of access policies so as to protect the privacy of users by improving the access structure. Users' private key is generated by the data owner and the attribute authorities, which improves the efficiency of key generation and resists conspiracy attack from illegal users and authorities. Based on Decisional Bilinear Diffie- Hellman (DBDH) assumption,the scheme is proved to be chosen-plaintext security under standard model. Experimental results indicate that this scheme can improve the efficiencies of key generation,encryption and decryption.
出处 《计算机工程》 CAS CSCD 北大核心 2018年第3期182-188,共7页 Computer Engineering
基金 国家自然科学基金(61672531 61100042) 湖北省自然科学基金(2015CFC867)
关键词 策略隐藏 多授权机构 属性基加密 云存储 合谋攻击 policy hiding multi-authority Attribute-based Encryption (ABE) cloud storage conspiracy attack
  • 相关文献

参考文献5

二级参考文献60

  • 1SAHAI A, WATERS B. Fuzzy identity-based encryption[A]. Ad- vances in the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT 2005)[C]. Aarhns, Denmark, 2005.457-473.
  • 2GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fme-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Secu-rity[C].Alexandria, VA, USA, 2006.89-98.
  • 3BETHENCOUNT J, SAHAI A, WATERS B. Ciphertext-policy attrib- ute-based encryption[A]. Proceedings of the 2007 IEEE Symposium on Security and Privacy(IEEE S&P 2007)[C]. Oakland,CA, USA, 2007.321-334.
  • 4KAPADIA A, TSANG PP, SMITH S W. Attribute-based publishing with hidden credential and hidden policies[A]. Proceedings of the 14th Annual Network and Distributed System Security SymposimfNDSS 2007)[C]. San Diego, CA,USA,2007. 179-192.
  • 5NISHIDE T, YONEYAMA K, OHTA K. Attribute-based encryption with partially hidden encryptor-specified access structures[A]. Pro- ceedings of the Applied Cryptography and Network Security (ACNS 2008) [C].New York, NY, USA, 2008.111-129.
  • 6LAI J Z, DENG R H, LI Y J. Fully secure cipertext-policy hiding CP-ABE[A]. Proceedings of the 7th Information Security Practice and Experience(ISPEC 2011)[C]. Guangzhou, China, 2011.24-39.
  • 7FREEMAN M. Converting pairing-based cryptosystems from com- posite-order groups to prime-order groups[A]. Advances in Advances in the 29th Annual International Conference on the Theory and Appli- cations of Cryptographic Techniques(EUROCRYPT 2010)[C]. Aarhus, Denmark, 2010.44-61.
  • 8IBRAIMI L, TANG Q, HARTEL P, et al. Efficient and provable se- cure ciphertext-policy attribute-based encryption schemes[A]. Pro- ceedings of the Information Security Practice and Experience[C].Xi'an, China, 2009.1 - 12.
  • 9BONEH D, GOH E, N1SSIM K. Evaluating 2-dnf formulas on cipher- texts[A]. Proceedings of the 1st Theory of Cryptography Confer- ence(TCC 2005)[C]. Cambridge, MA, USA, 2005. 325-341.
  • 10WATERS B. Dual system encryption: realizing fully secure ibe and hibe under simple assumptions[A]. Advances in the 29th International CryptologyConference(CRYPTO 2009)[C]. Santa Barbara,CA, USA, 2009. 619-636.

共引文献77

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部