期刊文献+

面向云存储的支持完全外包属性基加密方案 被引量:20

Fully Outsourced Attribute-Based Encryption with Verifiability for Cloud Storage
下载PDF
导出
摘要 广泛应用于云存储环境的属性基加密方案在密钥生成、数据加密和解密阶段需要大量计算资源,且计算量与属性集合或访问策略复杂度呈线性增长关系,该问题对于资源受限的用户变得更加严重.为解决上述问题,提出一种支持可验证的完全外包密文策略属性基加密方案.该方案可以同时实现密钥生成、数据加密和解密阶段的外包计算功能,并且能够验证外包计算结果的正确性.该方法可以有效减轻云存储系统中属性授权机构、数据拥有者和数据用户的计算负担.然后,在随机预言机模型下证明了所提方案的选择明文攻击的不可区分安全性,提供了所提方案的可验证性证明.最后,理论分析与实验验证结果表明所提方案在功能性和效率方面具有优势,更加适合实际应用情况. Attribute-based encryption(ABE)is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms in the cloud storage environment.However,the computation cost of most ABE schemes is considerably expensive during key generation,encryption and decryption phases.And the computation cost,which grows with the complexity of the access policy or the attribute set,is becoming critical barriers in applications running on resource-limited devices.Aiming at tackling the challenge above,a fully outsourced ciphertext-policy attribute-based encryption scheme with verifiability is proposed in this paper.The proposed scheme can achieve outsourced key generation,encryption and decryption simultaneously.In the proposed scheme,heavy computations are outsourced to public cloud service providers,and no complex operations are left for the attribute authority,data owner and data user.At the same time,the scheme can verify the correctness of the computing result in an efficient way,which is very important.The proposed scheme is proven to be indistinguishable against chosen plaintext attack secure under the random oracle model and is provided with verifiable proof.Finally,the results of theoretical analysis and experimental simulation show that the proposed scheme has advantages in function and efficiency,and it is more suitable for practical applications.
作者 赵志远 王建华 徐开勇 郭松辉 Zhao Zhiyuan;Wang Jianhua;Xu Kaiyong;Guo Songhui(PLA Information Engineering University,Zhengzhou 450001;Electronic Technology Institute of Air Force,Beijing 100195)
出处 《计算机研究与发展》 EI CSCD 北大核心 2019年第2期442-452,共11页 Journal of Computer Research and Development
基金 国家"九七三"重点基础研究发展计划基金项目(2013CB338000) 国家重点研发计划项目(2016YFB0501900)~~
关键词 云存储 属性基加密 混合访问策略 完全外包计算 可验证性 cloud storage attribute-based encryption hybrid access policy fully outsourced computation verifiability
  • 相关文献

参考文献1

二级参考文献29

  • 1Sahai A, Waters B. Fuzzy identity-based encryption [G] // LNCS 3494: Proc of the 24th Annual Int Conf on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2005). Berlin: Springer, 2005:457-473.
  • 2Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data [C] //Proc of the 13th ACM Conf on Computer and Communications Security (CCS 2006). New York: ACM, 2006:89-98.
  • 3Bethencourt J, Sahai A, Waters B. Cipheitext-policy attribute-based encryption [C]//Proc of the 14th ACM Conf on Computer and Communications Security (CCS 2007). New York: ACM, 2007:321-334.
  • 4Cheung L, Newport C. Provably secure ciphertext policy ABE [C]//Proc of the 14th ACM Conf on Computer and Communications Security (CCS 2007). New York: ACM, 2007:456-465.
  • 5Goyal V, Jain A, Pandey O, et al. Bounded ciphertext policy attribute based encryption [G] //LNCS 5126: Proc of the 35th Int Colloquium on Automata, Languages and Programming (ICALP 2008). Berlin: Springer, 2008: 579- 591.
  • 6Liang Xiaohui, Cao Zhenfu, Lin Huang, et al. Provably secure and efficient bounded ciphertext policy attribute based encryption[C]//Proc of the 4th Int Syrup on Information, Computer, and Communications Security (ASIACCS 2009). New York: ACM, 2009: 343-352.
  • 7Waters B. Ciphertext-policy attribute-based encryption.. An expressive, efficient, and provably secure realization [OL]. (2008-07-03) [2015-01-10]. http://eprint, iacr. org/2008/290.
  • 8Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization [G] // LNCS 6571: Proc of the 14th Int Conf on Practice and Theory in Public Key Cryptography (PKC 2011). Berlin: Springer, 2011:53-70.
  • 9Pirretti M, Traynor P, McDaniel P, et al. Secure attribute- based systems [C] //Proc of the 13th ACM Conf on Computer and Communications Security (CCS 2006). New York: ACM, 2006: 99-112.
  • 10Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures [C] //Proc of the 14th ACM Conf on Computer and Communications Security (CCS 2007). New York: ACM, 2007:195-203.

共引文献15

同被引文献112

引证文献20

二级引证文献76

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部