期刊文献+

改进的ABE在公有云存储访问控制中的研究 被引量:2

Research on Access Control for Cloud Storage by Improved ABE
下载PDF
导出
摘要 在云存储访问控制领域,属性基加密算法(attribute-based encryption,ABE)是一种极具应用前景的密码体制。ABE不仅可以保证云计算环境下的信息安全性,同时提供了灵活的访问控制机制。当前ABE在安全性上主要面临密钥托管问题(key escrow problem)的威胁,并且由于涉及大量双线性配对,在计算效率方面不尽如人意。设计了一种改进的ABE算法,通过私钥的分布式生成解决了密钥托管问题。同时改进的算法无需进行双线性配对,在计算效率上相比已有的ABE算法有所提升。通过将算法规约至计算Diffie-Hellman问题(compu-tational Diffie-Hellman problem,CDH)的难解性上,证明了该方案在随机预言机模型下能够抵抗选择密文攻击。 Attribute-based encryption(ABE)is a promising technique that provides not only data encryption but also flexible access control for cloud storage.Existing ABE schemes are mainly threatened by key escrow problem in terms of security,and are unacceptable in term of efficiency due to large bilinear pairing computation.To address these problems,an improved ABE is proposed.Owing to distributed generation of private keys,the key escrow problem is addressed.In addition,the improved ABE does not need any bilinear pairing computation.Compared with existing schemes,as a result,the computation overhead is reduced.By reduction to computational Diffie-Hellman assumption(CDH),the proposed scheme is proven to be secure against chosen ciphertext attacks in random oracle model.
作者 许萌 鲍安平 吕湛山 XU Meng;BAO Anping;LV Zhanshan(Nanjing College of Information Technology,Nanjing 210023,China;Shanxi Jincheng Anthracite Huayu Coal Chemical Co.,Ltd.,Jincheng,Shanxi 048000,China)
出处 《计算机科学与探索》 CSCD 北大核心 2019年第3期437-445,共9页 Journal of Frontiers of Computer Science and Technology
基金 江苏省"青蓝工程"科技创新团队项目Z170511~~
关键词 属性基加密算法(ABE) 访问控制 云存储 密钥托管 计算效率 attribute-based encryption(ABE) access control cloud storage key escrow computational efficiency
  • 相关文献

参考文献8

二级参考文献132

  • 1LeiHu,Jun-WuDong,Ding-YiPei.Implementation of Cryptosystems Based on Tate Pairing[J].Journal of Computer Science & Technology,2005,20(2):264-269. 被引量:8
  • 2Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer- Verlag, 1994. 480-491.
  • 3Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 4Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi: 10.1007/11535218_16].
  • 5Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology- CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984.47-53.
  • 6Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi: 10.1007/3-540-44647-8_13].
  • 7Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
  • 8Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 9Yu SC, Ren K, Lou WJ. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008.39-44. [doi: 10.1109/NPSEC.2008.4664879].
  • 10Traynor P, Butler K, Enck W, Mcdaniel P. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In: Proc. of the 15th Annual Network and Distributed System Security Symp. (NDSS 2008). San Diego: USENIX Association, 2008.1-13.

共引文献249

同被引文献11

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部