期刊文献+

云环境下支持隐私保护和用户撤销的属性基加密方案 被引量:12

Attribute-based Encryption Scheme Supporting Privacy Preserving and User Revocation in the Cloud Environment
下载PDF
导出
摘要 针对云环境中用户属性更新和隐私安全问题,文章提出一种具有隐私保护且支持用户撤销的属性基加密方案。该方案采用半策略隐藏方式,将属性分为属性名和属性值,加密时对属性值进行隐藏,具体属性值不会泄露给任何第三方,有效地保护了用户的隐私。另外,通过令牌树机制为用户生成密钥加密密钥,控制用户对属性陷门的获取,实现了高效的属性撤销,即使用户错过密钥即时更新的信息,也可在解密密文前更新自己的密钥。安全性分析表明,该方案可以抵抗合谋攻击,并满足选择明文攻击安全。通过与其他方案对比,本文方案在存储代价和计算代价方面都有所优化,更适用于实际应用中用户属性规模远远小于系统属性规模的情况。 In order to support fi ne-grained attribute revocation and privacy preserving in data outsourcingsystems,an effi cient privacy preserving attribute-based encryption scheme with user revocation is proposed.In the scheme,the attribute will be divided into two parts:attribute name and attribute value.Encryptorspecified access structures is partially hidden,so the value of user’s attributes will never be revealed to anythird parties,and the user’s privacy will be effectively preserved.Meanwhile,a token system is used tocreate key encryption key which can address the challenging issue of effi cient attribute revocation.The newscheme achieved fi ne-grained and immediate attribute revocation which is more suitable for the practicalapplications.In addition,the scheme is proved to be adaptively chosen plaintext attack secure in the standardmodel,and it can withstand conspiracy attack.Compared to the existing related schemes,computational costand storage cost is reduced,and it is more suitable for the practical applications in which user attributes ismuch less than the total of system attributes.
作者 闫玺玺 叶青 刘宇 YAN Xixi;YE Qing;LIU Yu(School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo Henan 454003, China;Information System and Security & Countermeasures Experimental Center, Beijing Institute of Technology, Beijing 100081, China)
出处 《信息网络安全》 CSCD 2017年第6期14-21,共8页 Netinfo Security
基金 国家自然科学基金[61300216] 河南省科技厅项目[132102210123] 河南省教育厅科研项目[16A520013] 河南理工大学2015年青年骨干教师资助项目
关键词 云环境 属性基加密 属性撤销 隐私保护 cloud environment attribute-based encryption attribute revocation privacy preserving
  • 相关文献

参考文献10

二级参考文献167

  • 1Sahai A and Waters B. Fuzzy identity-based encryption[C]. In EUROCRYPT 2005, 2005, LNCS 3494: 457-473.
  • 2Goyal V, Pandey O, Sahai A, et al.. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, New York, USA, 2006: 89-98.
  • 3Herranz J, Laguillaumie F, and Rafols C. Constant size ciphertexts in threshold attribute-based encryption[C]. In PKC 2010, 2010, LNCS 6065: 19-34.
  • 4Waters B. Ciphertext-policy attribute-based encryption: anexpressive, efficient, and provably secure realization[C]. In PKC 2011, 2011, LNCS 6571: 53-70.
  • 5Attrapadung N, Libert B, and Panafieu E. Expressive key-policy attribute-based encryption with constant-size ciphertexts[C]. In PKC 2011, 2011, LNCS 6571: 90-108.
  • 6Nishide T, Yoneyama K, and Ohta K. Attribute-based encryption with partially hidden encryptor-specified access structures[C]. In ACNS 2008, 2008, LNCS 5037: 111-129.
  • 7Lai J, Deng R H, and Li Y. Fully secure cipertext-policy hiding CP-ABE[C]. In ISPEC 2011, 2011, LNCS 6672: 24-39.
  • 8Freeman D M. Converting pairing-based cryptosystems from composite-order groups to prime-order groups[C]. In EUROCRYPT 2010, 2010, LNCS 6110: 44-61.
  • 9Lewko A and Waters B. New techniques for dual system encryption and fully secure HIBE with short ciphertexts [EB/OL]. http://eprint.iracr.org/2009/482, 2009.
  • 10Waters B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions[C]. In CRYPTO 2009, 2009, LNCS 5677: 619-636.

共引文献106

同被引文献61

引证文献12

二级引证文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部