期刊文献+

移动云环境下的多授权机构属性基加密方案 被引量:5

Multi-authority attribute-based encryption scheme in mobile cloud environment
下载PDF
导出
摘要 针对移动云数据的访问控制进行了研究,提出一种高效的、无需CA的多授权机构密文策略属性基加密方案。借助外部资源,在数据加密和解密过程分别增加预加密操作和可验证外包解密操作,从而降低用户的加/解密计算量,并采用双因子身份认证机制实现对用户的匿名认证。安全性分析表明,新方案基于判定性qBDHE(decisional q-parallel bilinear Diffie-Hellman exponent)假设可证明是选择明文安全的,并且能够抵抗合谋攻击。仿真实验表明,新方案有效降低了数据加密、解密的计算开销以及对密文的通信开销,能够实现对移动云数据安全、高效的访问控制。 Study on the data access control in mobile cloud,this paper proposed an efficient multi-authority ciphertext-policy attribute-based encryption scheme without any central authority(CA).The main idea was to outsource a part of computing tasks to some external servers,and considered to increase a pre-encryption operation and outsourcing decryption operation in the process of encryption and decryption,and used the two-factor authentication mechanism to achieve anonymous authentication.Security analysis indicates that this scheme was proven choose plaintext attack(CPA)security under the decisional q-pa-rallel bilinear Diffie-Hellman exponent assumption,furthermore,it could resist collusion attack.Experimental result shows that this scheme significantly reduces the bandwidth and the computation time for both data encryption and data decryption.Therefore,this scheme can achieve security and efficiency of data access control in mobile cloud environment.
作者 李学俊 吕茂旭 Li Xuejun;Lyu Maoxu(School of Cyber Engineering,Xidian University,Xi’an 710071,China)
出处 《计算机应用研究》 CSCD 北大核心 2018年第5期1519-1525,1544,共8页 Application Research of Computers
基金 国家"111"计划资助项目(B16037)
关键词 多机构属性基加密 预加密 外包解密 可验证 双因子身份认证 multi-authority attribute-based encryption(MA-ABE) pre-encryption outsourcing decryption verifiable two-factor authentication
  • 相关文献

参考文献2

二级参考文献42

  • 1Sahai A, Waters B. Fuzzy identity-based encryption [G] // LNCS 3494: Proc of the 24th Annual Int Conf on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2005). Berlin: Springer, 2005:457-473.
  • 2Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C] //Proc of the 13th ACM Conf on Computer and Communications Security (CCS 2006). New York: ACM, 2006:89-98.
  • 3Bethencourt J, Sahai A, Waters B. Cipheitext-policy attribute-based encryption [C]//Proc of the 14th ACM Conf on Computer and Communications Security (CCS 2007). New York: ACM, 2007:321-334.
  • 4Cheung L, Newport C. Provably secure ciphertext policy ABE [C]//Proc of the 14th ACM Conf on Computer and Communications Security (CCS 2007). New York: ACM, 2007:456-465.
  • 5Goyal V, Jain A, Pandey O, et al. Bounded ciphertext policy attribute based encryption [G] //LNCS 5126: Proc of the 35th Int Colloquium on Automata, Languages and Programming (ICALP 2008). Berlin: Springer, 2008: 579- 591.
  • 6Liang Xiaohui, Cao Zhenfu, Lin Huang, et al. Provably secure and efficient bounded ciphertext policy attribute based encryption[C]//Proc of the 4th Int Syrup on Information, Computer, and Communications Security (ASIACCS 2009). New York: ACM, 2009: 343-352.
  • 7Waters B. Ciphertext-policy attribute-based encryption.. An expressive, efficient, and provably secure realization [OL]. (2008-07-03) [2015-01-10]. http://eprint, iacr. org/2008/290.
  • 8Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization [G] // LNCS 6571: Proc of the 14th Int Conf on Practice and Theory in Public Key Cryptography (PKC 2011). Berlin: Springer, 2011:53-70.
  • 9Pirretti M, Traynor P, McDaniel P, et al. Secure attribute- based systems [C] //Proc of the 13th ACM Conf on Computer and Communications Security (CCS 2006). New York: ACM, 2006: 99-112.
  • 10Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures [C] //Proc of the 14th ACM Conf on Computer and Communications Security (CCS 2007). New York: ACM, 2007:195-203.

共引文献27

同被引文献35

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部