期刊文献+

支持多种特性的基于属性代理重加密方案 被引量:7

Attribute-based proxy re-encryption scheme with multiple features
下载PDF
导出
摘要 一个理想的代理重加密方案通常具有单向性、非交互性、可重复性、可控性和可验证性,然而目前的方案普遍只满足其中的2个或3个,在一定程度上降低了实用性。为此,提出了一种支持5种特性的密文策略基于属性代理重加密(CP-ABPRE)方案。在所提方案中,云代理服务器只能利用重加密密钥重加密委托者指定的密文,抵御了满足重加密共享策略的用户与代理之间的共谋攻击;将多数加解密工作外包给云服务器,减轻了用户客户端的计算负担。安全分析表明,所提方案能抵御针对性选择明文攻击。 A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to some extent.For this,a new ciphertext-policy attribute-based proxy re-encryption(CP-ABPRE)scheme with the above five features was proposed.In the proposed scheme,the cloud proxy server could only re-encrypt the ciphertext specified by the delegator by using the re-encryption key,and resist the collusion attack between the user and the proxy satisfying the re-encryption sharing policy.Most of encryption and decryption were outsourced to cloud servers so that it reduced the computing burden on the user’s client.The security analysis show that the proposed scheme resists the selective chosen plaintext attack(SCPA).
作者 冯朝胜 罗王平 秦志光 袁丁 邹莉萍 FENG Chaosheng;LUO Wangping;QIN Zhiguang;YUAN Ding;ZOU Liping(School of Computer Science,Sichuan Normal University,Chengdu 610101,China;Network and Data Security Key Laboratory of Sichuan Province,University of Electronic Science and Technology of China,Chengdu 610054,China)
出处 《通信学报》 EI CSCD 北大核心 2019年第6期177-189,共13页 Journal on Communications
基金 国家科技支撑计划基金资助项目(No.2014BAH11F02) 国家自然科学基金资助项目(No.61373163) 网络与数据安全四川省重点实验室课题基金资助项目(No.NDS2019-1) 四川师范大学研究生优秀论文培育基金资助项目(川师研[2018]3号-38)~~
关键词 基于属性加密 代理重加密 外包加密 外包解密 选择明文安全 attribute-based encryption proxy re-encryption outsourcing encryption outsourcing decryption chosen plaintext security
  • 相关文献

参考文献4

二级参考文献74

  • 1SHEHAB M, SQUICCIARINI A, AHN G, et al. Access control for online social networks third party applications[J]. Computers and Security, 2012, 31 (8): 897-911.
  • 2RAJI F, MIRI A, JAZI M. CP2: Cryptographic privacy protection framework for online social networks[J]. Computers and Electrical Engineer- ing, 2013, 39(7): 2282-2298.
  • 3LAI Junzuo, DENG R H, GUAN Chaowen, et al. Attribute-Based Encryption with Verifiable Outsourced Decryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(8): 1343-1354.
  • 4WAN Zhiguo, LIU June, DENG R H. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 743-754.
  • 5WU Yongdong, WEI Zhuo, DENG R H. At- tribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks[J]. IEEE Transactions on Multimedia, 2013, 15(4): 778-788.
  • 6SHUAI Huimin, ZHU Wentao. Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks[C]// Proceedings of 6th International Conference on Network and System Security (NSS'2012): November 21-23, 2012. Wuyishan, Fujian, China, 2012: 503-515.
  • 7BETHENCOURT J, SAHAI A, WATERS B. Cipher- text-Policy Attribute-Based Encryption[C]//Pro- ceedings of 2007 IEEE Symposium on Security and Privacy (SP'07): May 20-23, 2007. Berkeley, CA, USA, 2007:321-334.
  • 8HUR J. Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid[J]. IEEE Transactions on Parallel and Distributed Sys- tems, 2013, 24(11): 2171-2180.
  • 9HU Hongxin, AHN G. Multiparty Authorization Framework for Data Sharing in Online Social Networks[C]// Proceedings of 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec'2011): July 11-13, 2011. Richmond, VA, USA, 2011: 29-43.
  • 10HUR J, NOH D. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(7): 1214-1221.

共引文献191

同被引文献74

引证文献7

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部