期刊文献+

物联网中基于属性加密与相等性测试

Attribute-based encryption with equality test in the internet of things
下载PDF
导出
摘要 为保护资源受限的物联网设备间数据交换的安全与隐私,采用外包技术,把密文策略基于属性加密与相等性测试结合,针对物联网设备,提出一种简洁的加解密算法,并在不解密的情况下建立由授权云服务器执行的密文检测机制,从而减轻本地计算负担和实现精确解密.基于判定性q-1假设,证明提出的方案抗选择明文攻击,是不可区分安全的.最后,实验分析表明方案实用且有效. In order to protect the security and privacy of data exchange between the resource-constrained Internet of Things (IoT) devices, the outsourcing technology is adopted to combine the ciphertext policy attribute-based encryption and equality test. For IoT devices,a concise encryption and decryption algorithm is proposed,as well as the ciphertext detection mechanism performed by the authorized cloud server is established without decryption, thereby alleviating the local computing burden and achieving accurate decryption. Based on the decisional q- 1 assumption, it is proved that the proposed scheme resists chosen plaintext attacks and enjoys indistinguishable security. Finally, the experimental analysis shows that the scheme is practical and effective.
作者 姚莉沙 王尚平 YAO Li-sha;WANG Shang-pingk(School of Science,Xi'an University of Technology ,Xizan 710054,China;Key Laboratory of NetworkComputing and Security Technology of Shaanxi Province,Xi'an 710048,China)
出处 《微电子学与计算机》 北大核心 2019年第6期64-69,73,共7页 Microelectronics & Computer
基金 国家自然科学基金(61572019) 陕西省自然科学基础研究计划-重点项目资助(2016JZ001)
关键词 物联网 基于属性加密 相等性测试 选择明文攻击 Internet of Things attribute-based encryption equality test chosen plaintext attacks
  • 相关文献

参考文献2

二级参考文献13

  • 1Mell P, Grance T. 800-145 The NIST definition of cloud computingrS3. Gaithersburg, USA, National In- stitute of Standards and Technology, 2009.
  • 2Sahai A, Waters B. Fuzzy identity-based encryption EC//The 24th annual international conference on the theory and applications of cryptographic techniques, 2005. Aarhus, Denmark, Springer, 2005 : 457-473.
  • 3Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryptionC// IEEE symposium on security and privacy (SP' 07), 2007. Oakland, USA: IEEE Computer Society, 2007 .- 321-334.
  • 4Waters B. Ciphertext-policy attribute-based encryption [C// An expressive, efficient, and provably secure realization: The 14th International Conference on Practice and Theory in Public Key Cryptography (PKC 2011). Heidelberg, Germany. Springer, 2011. 53-70.
  • 5Yang K, Jia Xiaohua, Ren K, et al. Dac-macs: effec- tive data access control for multi-authority cloud stor- age systems[C]// IEEE INFOCOM 2013. Turin. 2013 : 2895-2903.
  • 6Jung T, Li XiangymN, Wan Zhiguo,et ak Privacy preser- ving cloud data access with multi-authorities[C]// INFOCOM 2013. Turin, IEEE, 2013: 2625-2633.
  • 7Hur J, Noh D K. Attribute-based access control with efficient revocation in data outsourcing systems [J]. IEEE Transactions on Parallel and Distributed Sys- tems, 2011, 22(7): 1214-1221.
  • 8Cheumg L, Newport C. Provably secure ciphertext policy ABE[C]// The 14th ACM conference on com- puter and communications security, 2007. New York ACM, 2007: 456-465.
  • 9Bobba R, Khurana H, Prabhakaran M. Attribute-sets.- a practically motivated enhancement to Attribute-Based encryptionECl//The 14th european symposium on re- search in computer security. France: Springer, 2009: 587-604.
  • 10Zhao J, Feng D, Zhang Z. Attribute-based conditional proxy re-eneryption with chosen-ciphertext security I-C]// Global telecommunications conference (GLO- BECOM 2010). Miami,FL: IEEE, 2010:1-6.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部