期刊文献+

去中心化且固定密文长度的基于属性加密方案 被引量:6

Decentralized Attribute-Based Encryption Scheme with Constant-Size Ciphertexts
下载PDF
导出
摘要 基于素数阶双线性群,提出了一种去中心化的基于属性加密方案,并在标准模型下证明了方案的安全性.该方案中含有一个中央机构(central authority,CA)和多个属性机构(attribute authority,AA),其中中央机构负责生成与用户全局唯一身份标识绑定的随机值,并且不参与任何属性相关的操作,有效地抵抗了合谋攻击.每个属性机构负责互不相交的属性域并且相互独立,甚至不需要知道其他属性机构的存在.特别地,任何机构都不能独立解开密文.进一步,可以将该方案推广至多中央机构情形,中央机构之间亦相互独立,用户只需在其信任的任何一个中央机构注册即可,实现了真正意义上的"去中心化".该方案中密文长度达到了固定值,同时解密运算只需要2个双线性对,在Charm架构下的仿真实验表明:该方案具有非常高的效率. Based on prime-order bilinear groups,we propose a decentralized multi-authority attributebased encryption scheme which is proven to be secure in the standard model.Firstly,we construct an attribute-based encryption system with a central authority(CA)and multiple attribute authorities(AAs),where CA is responsible for generating a random value associated with each user's unique global identifier(GID),and does not participate in any operation related to users'attributes.Different users will get different random values,thus they cannot obtain any information beyond authority even through collusion.Every attribute authority is responsible for different attributes domain and they are independent of each other.It's even not necessary to know the existence of each other in the system.In particular,there is no authority that can decrypt a ciphertext alone.Secondly,this scheme can be extended to a decentralized attribute-based encryption with multiple CAs setting,where every CA is also independent of each other,and each user can issue his private key from only one CA.Bringing it into practice under the Charm infrastructure,the results show that the decentralized attribute based encryption schemes are very efficient,whose ciphertexts are of constant size,i.e.,regardless of the number of underlying attributes of access control policy or users.
作者 肖思煜 葛爱军 马传贵 Xiao Siyu;Ge Aijun;Ma Chuangui
出处 《计算机研究与发展》 EI CSCD 北大核心 2016年第10期2207-2215,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61309016,61379150,61502529) 信息安全国家重点实验室开放课题(2016-MS-15)~~
关键词 去中心化 多机构基于属性加密 密文数据访问控制 固定长度密文 抗合谋攻击 decentralized multi-authority attribute-based encryption ciphertext access control constant-size ciphertext collusion resistant
  • 相关文献

参考文献6

二级参考文献189

  • 1曹珍富.密码学的新发展[J].四川大学学报(工程科学版),2015,47(1):1-12. 被引量:27
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1362

同被引文献29

引证文献6

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部