期刊文献+

基于属性加密的细粒度家庭文件安全共享方案

Fine-grained Home File Security Sharing Scheme Based on Attribute Encryption
下载PDF
导出
摘要 用户在家庭共享环境下获取文件的过程中,身份隐私信息可能被泄露。为此,提出一种基于属性加密的细粒度文件共享方案。根据用户需求,利用线性秘密共享方案制定访问策略,使用属性加密算法得到其密文,在验证用户属性是否满足访问策略后通过属性解密算法获取共享文件。实验结果表明,属性个数不超过100时,该方案的加、解密效率可以满足用户的实际需求。 In the environment of home sharing,the user's identity privacy may be leaked in the process of obtaining the file.To solve this problem,a fine-grained file sharing scheme based on attribute encryption is proposed.According to the needs of users,the linear secret sharing scheme is used to make access strategy,then the attribute based encryption algorithm is used to get the attribute based encryption ciphertext.Finally,after verifying whether the user property meets the access policy,the shared file by the property decryption algorithm is obtained.Experimental results show that,when the number of attributes is less than 100,the encryption and decryption efficiency of the proposed scheme can meet the user's actual needs.
作者 梁才 涂国庆 刘梦君 LIANG Cai;TU Guoqing;LIU Mengjun(Computer School,Wuhan University,Wuhan 430072,China)
出处 《计算机工程》 CAS CSCD 北大核心 2018年第4期206-211,共6页 Computer Engineering
关键词 家庭共享 访问控制 细粒度控制 属性加密 线性秘密共享方案 home sharing access control fine-grained control attribute encryption linear secret sharing scheme
  • 相关文献

参考文献1

二级参考文献13

  • 1SHAMIR A. How to share a secret [ J]. Communications of the, AEM, 1979, 24(11):612-613.
  • 2BLAKLEY G. Safeguarding cryptographic key [ C] // 1979 Proceedings Of National Computer C0nference. Washington, DC: IEEE Computer Society, 1979:313 - 317.
  • 3TOMPA M, WOLL H. How to share a secret sharing with cheaters [J]. Journal of Cryptology, 1988, 1(3) : 133 - 138.
  • 4HE J, DAWSON E. Multistage secret sharing based on one-way function [ J]. Electronic Letters, 1994, 30(19) : 1591 - 1592.
  • 5CHANG C 'C, HWANG R J. Efficient cheater identification method for threshold schemes [ J]. lEE Proceedings of Computers and Digital Techniques, 1997, 144(1) : 23 -27.
  • 6BENALOH J, LEICHTER J. Generalized Secret sharing and monotone functions: advances in cryptology [ C]// Proceedings on Advances in Cryptology. Berlin: Springer-Verlag, 1990:27-35.
  • 7CHEN W, LONG X, BAI Y B, et aL A new dynamic threshold secret sharing scheme from bilinear maps [ C]// 2007 International Conference on Parallel Processing Workshops. Washington, DC: IEEE Computer Society, 2007:19 -22.
  • 8黄挚雄,黎群辉,危韧勇,李志勇.一种防欺骗的广义多秘密分享方案[J].铁道学报,2007,29(6):52-56. 被引量:1
  • 9任勇军,王建东,庄毅,方黎明.基于双线性对的秘密重分配方案[J].兰州大学学报(自然科学版),2008,44(1):82-85. 被引量:2
  • 10张建中,李文敏.基于LUC密码体制的广义秘密共享方案[J].计算机工程,2008,34(8):162-163. 被引量:7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部