期刊文献+

基于扩展属性基功能加密的有效外包计算 被引量:1

Effecient outsourced computing based on extended attribute-based functional encryption
下载PDF
导出
摘要 针对目前属性基加密(ABE)方案存在的主要问题,即访问策略功能单一的问题和密文的大小和解密时间随着访问公式的复杂性增加而增长的问题,提出了有效外包计算的多功能ABE方案。首先,通过对敏感数据的细粒度访问控制,实现了不同功能加密系统;然后,利用云服务器巨大的计算能力进行部分解密计算,将满足访问策略的用户属性密文转化为一个(常量大小)El Gamal类型的密文;同时通过有效的验证方法保证外包运算的正确性。理论分析结果表明,与传统属性基功能加密方案相比,所提方案用户端的解密计算降低至一次指数运算和一次对运算,该方案在不增加传输量的情况下,为用户节省了大量带宽和解密时间。 The main problems exist in current Attribute-Based Encryption(ABE) schemes, such as the access policy has a single function, and the size and decryption time of ciphertext increase with the complexity of access formula. In order to solve the problems, a multi-function ABE scheme for effecient outsourced computing was proposed. Firstly, through the finegrained access control of sensitive data, different function encryption systems were implemented. Then, using the huge computing power of cloud server to perform partial decryption calculations, the user attribute ciphertext satisfying the access policy was converted into a(constant-size) El Gamal-style ciphertext. At the same time, the correctness of outsourced computing was ensured through the efficient verification methods. The theoretical analysis results show that, compared with the traditional attribute-based functional encryption scheme, the decryption computation at the user end of the proposed scheme is reduced to one exponential operation and one pair operation. The proposed scheme can save a lot of bandwidth and decryption time for users without increasing the amount of transmission.
作者 李聪 杨晓元 王绪安 LI Cong 1,2 , YANG Xiaoyuan 1,2 , WANG Xu an 1,2(1. College of Cryptographic Engineering, Engineering University of the Chinese Armed Police Force, Xi an Shaanxi 710086, China ;2. Key Laboratory of Network and Information Security of the Chinese Armed Police Force, Xi an Shaanxi 710086, Chin)
出处 《计算机应用》 CSCD 北大核心 2018年第6期1633-1639,共7页 journal of Computer Applications
基金 国家自然科学基金资助项目(U1636114 61772550)~~
关键词 功能加密 外包解密 可验证 属性基加密 云计算 functional encryption outsourced decryption verifiability Attribute-Based Encryption (ABE) cloud computing
  • 相关文献

参考文献2

二级参考文献38

  • 1Sahai A, Waters B. Fuzzy identity-based encryption [ A ]. Aarhus: Advances in Cryptology-EUROCRYPT 2005 [ C ]. Berlin: Springer,2005.457 - 473.
  • 2Bethencourt J, Sabai A, Waters B. Ciphertext-policy attribute- based encryption[ A]. Procceedmgs of the 2007 IEEE Security and Privacy[ C]. Oakland:IEEE, 2007.321 - 334.
  • 3Yang K, Jia X,Ren K. Atlribute-based fine-grained access con- trol with efficient revocation in cloud storage systems[ A]. Pro- ceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security [ C ]. Berlin: ACM, 2013.523 - 528.
  • 4S Yu,C Wzng,K Ren,W Lou.Achieving secure,scalable, and fme-grained data access control in computing[A]. Proceedings of the 2010 IEEE INPCCOM[C] .San Diego:IEEE,2010. 1-9.
  • 5J Hur, D K Noh. Attribute-based access control with efficient re-vocation in data outsourcing systems[ J ]. IEEE Transactions on Parallel and Distributed Systems,2011,22(7):1214- 1221.
  • 6Zhou Z, Huang D. On efficient ciphertext-policy attribute based enclyption and broadcast encryption [ A ]. Proceedings of the 17th ACM Conference on Computer and Communications Se- curity[ C]. Chicago: ACM,2010.753 - 755.
  • 7Shamir A. How to share a secret [ J ]. Communications of the ACM, 1979,22(11) :612 - 613.
  • 8Hohenberger S,Waters B. Attribute-based encryption with fast decrypfion [ A ]. Public-Key CYyptography-PKC 2013 [ C ]. Berlin: Springer,2013.162 - 179.
  • 9Waters B. Ciphertext-policy attribtg.e-based encryplion: An ex- pressive, efficient, and provably secure realization [ A ]. Public Key O3qXOgalYay-PKC 2011[C] .Berlin: Spdnger,2011.53 - 70.
  • 10Lewko A, Okamoto T, Sahai A, et al. Fully secure functional encryption: Atlribute-based encryption and (hierarchical) inner product encryption [ A ]. Advances in Cryptology-EURO- CRYPT 2010[ C]. Berlin: Springer, 2010.62 - 91.

共引文献15

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部