期刊文献+

一种支持撤销的双策略属性基加密方案

Dual Policy Based Encryption Scheme Supporting Attribute Revocation
下载PDF
导出
摘要 针对于目前云数据访问控制研究中存在单一策略属性基加密的应用局限性和属性撤销不够灵活等问题,本文提出了一种支持撤销的双策略属性基加密方案.首先对属性撤销中的密文策略和密钥策略的综合应用进行定义并给出安全模型;其次构建逻辑二叉树,利用哈希函数不可逆的性质,从每个用户对应的叶子节点开始自下往上地进行哈希运算得到父节点直到根节点,使其计算方向单一.利用每个属性对应的最大覆盖子树的根节点所生成的组密钥对密文和私钥进行更新,从而能够保证组密钥能够被合法用户获得;最后通过安全性分析和复杂性对比表明,该方案满足选择明文攻击安全且在计算复杂度方面是最优的. This paper proposes a dual policy-attribute base encryption scheme supporting revocation according to the problems in the current research on cloud data access control i. e. the application limitation and attribute revocation inflexibility of the single policy -at- tribute base encryption. First of all ,it defines and the integrated application of ciphertext policy and key policy in the attribute revoca- tion and provides the security model; secondly, it structures the logical binary tree and makes use of the irreversibility of hash function to carry out the hash operation bottom up from the leaf node corresponded to each user to obtain the father node till the root node, so as to simplify the computing direction. The ciphertext and private key are updated with the help of the group key generated by the root node of the maximum covering sub-tree corresponded to each attribute, so as to make sure the group key can be obtained by the legal user;fmaily, according to the security analysis and complexity comparison, this scheme could not only satisfy the plaintext attack secur- ity but also remain the optimum in the computing complexity.
作者 谭跃生 郉晨烁 王静宇 TAN Yue-sheng;XING Chen-shuo;WANG Jing-yu(School of Information Engineering,Inner Mongolia University of Science & Technology,Baotou 014010,China I)
出处 《小型微型计算机系统》 CSCD 北大核心 2018年第8期1744-1749,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61462069,61662056)资助 内蒙古自然科学基金项目(2015MS0609.2015MS0622,2016MS0608)资助.
关键词 属性撤销 双策略 逻辑二叉树 哈希函数 attribute revocation dual policy hash function logical binary tree
  • 相关文献

参考文献4

二级参考文献26

  • 1Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology--EUROCRYPT 2005. Berlin: Springer-Verlag, 2005.457-473. [doi: 10.1007/11426639_27].
  • 2Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 3Ostrovsky R, Sahai A, Waters B. Attribute-Based encryption with non-monotonic access structures. In: Proc. of the 14th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007. 195-203. [doi: 10.1145/1315245.1315270].
  • 4Attrapadung N, Imai H. Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B, eds. Proc. of the Pairing-Based Cryptography--Pairing 2009. Berlin: Springer-Verlag, 2009.248-265. [doi: 10.1007/978-3-642-03298-1_16].
  • 5Attrapadung N, Imai H. Attribute-Based encryption supporting direct/indirect revocation modes. In: Parker MG, ed. Proc. of the Cryptography and Coding. Berlin: Springer-Verlag, 2009. 278-300. [doi: 10.1007/978-3-642-10868-6_17].
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-Poliey attribute-based encryption. In: Proc. of the 2007 IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2007. 321-334. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?amumber=4223236 [doi: 10.1109/SP.2007.11].
  • 7Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Catalano D, Catalano N, eds. Proc. of the Public Key Cryptography (PKC 2011). Berlin: Springer-Verlag, 2011. 53-70. [doi: 10.1007/978-3- 642-19379-8_4].
  • 8Su JS, Cao D, Wang XF, Sun YP, Hu QL. Attribute based encryption schemes. Journal of Software, 2011,22(6): 1299-1315 (in Chinese with English abstract), http://www.jos.org.cn/1000-9825/3993.htm [doi: 10.3724/SP.J.1001.2011.03993].
  • 9Hanaoka Y, Hanaoka G, Shikata J, Imai H. Identity-Based hierarchical strongly key-insulated encryption and its application. In: Roy B, cd. Advances in Cryptology--ASIACRYPT 2005. Berlin: Springer-Verlag, 2005. 495-514. Idol: 10.1007/11593447_27].
  • 10Boldyreva A, Goyal V, Kumar V. Identity-Based encryption with efficient revocation. In: Proc. of the 15th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2008. 417-426. [doi: 10.1145/1455770.1455823].

共引文献72

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部