期刊文献+

云存储中支持属性可撤销的属性加密方案 被引量:2

Support efficient attribute revocation in cloud storage of attribute encryption schemes
下载PDF
导出
摘要 针对云计算环境下为解决属性加密方案在实际应用中的属性撤销问题,本文结合直接撤销方式和间接撤销方式的优点提出云存储中支持属性可撤销的属性加密方案.该方案中的授权机构依照系统中的所有用户给出一份合法用户列表并在加密算法中定义当前的属性时间,当撤销发生时可选择直接将合法用户列表中撤销的用户删除或依据被定义的属性时间更新未撤销属性密钥完成间接撤销并在标准模型下使安全性得到了证明.仿真实验表明了在保证安全性的同时增加了撤销效率. Combining the advantages of direct revocation method and indirect revocation,a property encryption scheme supporting revocation of attributes in cloud storage was proposed to solve the attribute revocation problem of the attribute encryption scheme in practical applications in the cloud computing environment. The authorized agency in the scheme gives a list of legal users according to all users in the system and defines the current attribute time in the encryption algorithm. When the revocation occurs,the authorized user can choose to delete the revoked user directly from the list of legitimate users or update the unrevoked attribute key according to the defined attribute time to complete the indirect revocation,and the security was demonstrated under the standard model. Simulation experiments show that the efficiency of revocation is increased while the security is ensured.
作者 谭跃生 曹耀介 王静宇 TAN Yue-sheng;CAO Yao-jie;WANG Jing-yu(Information Engineering School,Inner Mongolia University of Science and Technology,Baotou 014010,China)
出处 《内蒙古科技大学学报》 CAS 2018年第1期65-71,共7页 Journal of Inner Mongolia University of Science and Technology
基金 国家自然科学基金资助项目(61662056) 内蒙古自然科学基金资助项目(2016MS0608 2016MS0609)
关键词 云计算 云存储 属性加密 直接属性撤销 间接属性撤销 逻辑二叉树 cloud computing cloud storage attribute encryption direct attribute revocation indirect attribute revocation logical bi-nary tree
  • 相关文献

参考文献3

二级参考文献40

  • 1Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology--EUROCRYPT 2005. Berlin: Springer-Verlag, 2005.457-473. [doi: 10.1007/11426639_27].
  • 2Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 3Ostrovsky R, Sahai A, Waters B. Attribute-Based encryption with non-monotonic access structures. In: Proc. of the 14th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007. 195-203. [doi: 10.1145/1315245.1315270].
  • 4Attrapadung N, Imai H. Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B, eds. Proc. of the Pairing-Based Cryptography--Pairing 2009. Berlin: Springer-Verlag, 2009.248-265. [doi: 10.1007/978-3-642-03298-1_16].
  • 5Attrapadung N, Imai H. Attribute-Based encryption supporting direct/indirect revocation modes. In: Parker MG, ed. Proc. of the Cryptography and Coding. Berlin: Springer-Verlag, 2009. 278-300. [doi: 10.1007/978-3-642-10868-6_17].
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-Poliey attribute-based encryption. In: Proc. of the 2007 IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2007. 321-334. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?amumber=4223236 [doi: 10.1109/SP.2007.11].
  • 7Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Catalano D, Catalano N, eds. Proc. of the Public Key Cryptography (PKC 2011). Berlin: Springer-Verlag, 2011. 53-70. [doi: 10.1007/978-3- 642-19379-8_4].
  • 8Su JS, Cao D, Wang XF, Sun YP, Hu QL. Attribute based encryption schemes. Journal of Software, 2011,22(6): 1299-1315 (in Chinese with English abstract), http://www.jos.org.cn/1000-9825/3993.htm [doi: 10.3724/SP.J.1001.2011.03993].
  • 9Hanaoka Y, Hanaoka G, Shikata J, Imai H. Identity-Based hierarchical strongly key-insulated encryption and its application. In: Roy B, cd. Advances in Cryptology--ASIACRYPT 2005. Berlin: Springer-Verlag, 2005. 495-514. Idol: 10.1007/11593447_27].
  • 10Boldyreva A, Goyal V, Kumar V. Identity-Based encryption with efficient revocation. In: Proc. of the 15th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2008. 417-426. [doi: 10.1145/1455770.1455823].

共引文献64

同被引文献19

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部