期刊文献+

基于安全三方计算的密文策略加密方案 被引量:3

Ciphertext Policy Encryption Scheme Based on Secure Three-party Computation
下载PDF
导出
摘要 针对现有密文策略属性加密方案存在用户密钥易泄露的问题,提出一种基于安全三方计算协议的密文策略方案。通过属性授权中心、云数据存储中心及用户之间进行安全三方计算构建无代理密钥发布协议,使用户端拥有生成完整密钥所必需的子密钥。安全分析表明,该方案能够有效消除单密钥生成中心及用户密钥在传输给用户过程中易泄露所带来的威胁,增强用户密钥的安全性。 Aiming at the problem that the user key is easy to be leaked in the existing ciphertext policy attribute encryption scheme,a ciphertext policy scheme based on secure three-party computation protocol is proposed.By using Attribute Authorization center(AA),cloud Data Storage Center(DSC)and User,a secure three-party calculation is carried out to construct the proxy-free key publishing protocol,which enables the client to have the necessary subkeys to generate the complete key.The security analysis shows that this scheme can effectively eliminate the threat caused by the single secret key generation center and the easy leakage of the user key in the process of transmission to the user and enhance the security of the user key.
作者 谭跃生 鲁黎明 王静宇 TAN Yuesheng;LU Liming;WANG Jingyu(School of Information Engineering,Inner Mongolia University of Science and Technology,Baotou,Inner Mongolia 014010,China)
出处 《计算机工程》 CAS CSCD 北大核心 2019年第1期115-120,128,共7页 Computer Engineering
基金 国家自然科学基金(61462069 61662056) 内蒙古自治区自然科学基金(2016MS0608 2016MS0609)
关键词 属性加密 信息安全 安全三方计算 访问控制 密文策略 attribute encryption information security secure three-party computation access control ciphertext policy
  • 相关文献

参考文献4

二级参考文献19

  • 1Shamir. Identity-based cryptosystems and signature schemes[C]. Proc of CRYPTO'84 on Advances in Cryptology. Heidelberg, 1985: 47-53.
  • 2Boneh Dan, Matt Franklin. Identity-based encryption from the weil pairing[C]. Proc of the 21st Annual Int Cryptology Conf on Advances in Cryptology. California, 2001: 213- 229.
  • 3Sahai A, Waters B. Fuzzy identity based encryption[C]. Advances in Cryptology-Eurocrypt. Aarhus, 2005: 457- 473.
  • 4Sahai A, Waters B. Ciphertext-policy attribute based encryption[C]. Proc IEEE Symposium on Security and Privacy. California: IEEE Computer Society, 2007: 321- 334.
  • 5Yong Cheng, Jiangchun Ren. Attributes union in CP- ABE algorithm for large universe cryptographic access control[C]. 2012 the 2nd Int Conf on Cloud and Greed Computing. Xiangtan: IEEE Computer Society, 2012: 181- 185.
  • 6Junbeom Hur, Dong Kun Noh. Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Trans on Parallel and Distributed Systems, 2011, 22(7): 1214-1221.
  • 7Zhiguo Wan, Jun'e Liu, Robert H Deng. HASBE: A hierarchical attribute-based solution for flexible and scalable acce[J]. IEEE Trans on Information Forensics and Security, 2012, 7(2): 743-754.
  • 8Chase M, Chow S S M. Improving privacy and security in multi-authority attribute-based encryption[C]. Proc ACM Conf on Computer and Communications Security. Chicago: ACM, 2009: 121-130.
  • 9Chow S S M. Removing escrow from identity-based encryption[C]. Proc PKC2009. Irvine, 2009, 5443: 256- 276.
  • 10Hur Junbeom. Removing escrow from ciphertext policy attribute-based encryption[J]. Computers and Mathematics with Applications, 2013, 65(9): 1310-1317.

共引文献12

同被引文献37

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部