期刊文献+

基于密文策略属性基加密的多授权中心访问控制方案 被引量:9

CP-ABE based data access control scheme with multi-authorities
下载PDF
导出
摘要 针对单授权中心方案通信和计算开销较大的问题,提出一种基于密文策略属性基加密(ciphertext-policy attribute-based encryption,CP-ABE)的多授权中心访问控制方案。该方案引入属性管理器对用户属性进行分组,多个授权中心共同生成密钥,同时将部分解密交给云服务器进行。该方案减少了授权中心间的通信消耗和用户解密的资源消耗,同时通过安全性证明及与现有方案进行对比证明该方案安全高效。 Considering high communication and computation overhead in single authority setting,this paper proposed an efficient multi-authorities access control scheme based on ciphertext-policy attribute-based encryption(CP-ABE).The scheme introduced an attribute management server which distributed attributes,and multi-authorities centers generated the key together,and also delegated partial decryption to the cloud server.The scheme reduced the communication cost between the attribute authorities,and also reduced the resource consumption of users.The scheme is provable secure,and comparison with the existing schemes show that it is efficient.
作者 雷丽楠 李勇 Lei Linan;Li Yong(School of Electronic&Information Engineering,Beijing Jiaotong University,Beijing 100044,China;Fujian Provincial Key Laboratory of Network Security&Cryptology,Fujian Normal University,Fuzhou 350007,China)
出处 《计算机应用研究》 CSCD 北大核心 2018年第1期248-252,276,共6页 Application Research of Computers
基金 中央高校基本科研业务费专项资金资助项目(2016YJS003) 国家自然科学基金面上项目(61472032) 福建省网络安全与密码技术重点实验室(福建师范大学)开放课题(15007)
关键词 访问控制 密文策略属性基加密 多授权中心 抗合谋攻击 选择明文攻击 access control ciphertext-policy attribute-based encryption multi-authorities center anti-collusion attack chosen plaintext attack
  • 相关文献

参考文献3

二级参考文献26

  • 1王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 2张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 3林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 4Canneti R,Halevi S,Katz J.A forward secure public key encryption scheme[C]//Proc of Eurocrypt'03,LNCS 2656,Berlin:Springer-Verlag,2003:255-271.
  • 5Dodis Y,Katz J,Xu S,et al.Key-insulated public key cryptosystems[C]//Proc of Eurocrypt'02,LNCS 2332,Berlin:Springer-Verlag,2002:65-82.
  • 6Dodis Y,Franklin M,Katz J,et al.Intrusion-resilient public-key encryption[C]//Proc of CT-RSA'03,LNCS 2612,Berlin:Springer-Verlag,2003:19-32.
  • 7Joux A.A one-round protocol for tripartite Diffie-Hellman[C]//Proc of Fourth Algorithmic Number Theory Symposium,LNCS 1838,Berlin:Springer-Verlag,2000:385-394.
  • 8Boneh D,Franklin M.Identity-based encryption from the Weil pairing[C]//Proc of Crypto'01,LNCS 2139,Berlin:Springer-Verlag,2001:213-229.
  • 9Cha J C,Cheon J H.An Identity-based signature from Gap Diffie-Hellman Groups[C]//Proc of PKC'03,LNCS 2567,Berlin:Springer-Verlag,2003:18-30.
  • 10Boneh D,Boyen X.Efficient selective-ID secure identity-based encryption without random oracles[C]//Proc of Eurocrypt'04,LNCS 3027,Berlin:Springer-Verlag,2004:223-238.

共引文献233

同被引文献70

引证文献9

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部