期刊文献+

云计算多授权机构的属性基加密方案 被引量:2

Attribute-based Encryption Scheme of Cloud Computing Multi-authority
下载PDF
导出
摘要 现有属性基加密方案多以单一授权机构为主,一旦单授权中心受到攻击则整个系统的数据安全均无法得到保障。为提高整个系统的安全性,解决单授权机构易造成系统瓶颈的问题,提出一种多授权机构的属性基加密方案。该方案通过多授权机构分散管理属性以提高系统安全性;在用户访问请求阶段就预先判断是否需要发送密文,以此降低部分用户端计算开销。通过安全性分析证明该方案的安全性。与传统方案对比,结果显示,该方案在解密过程中节省了部分计算开销。 The existing attribute-based encryption schemes are mostly based on a single authorized institution. Once a single authorized center is attacked,the data security in the entire system cannot be guaranteed. In order to improve the security of the entire system and to solve the problem that a single authorization organization is likely to cause system bottlenecks,this paper presents an attribute-based encryption scheme for multiple authorization organizations. This scheme improves the security of the system by decentralizing the management attributes of multiple authorization agencies;it reduces the computing overhead of some users by judging in advance whether the cipher text needs to be sent at the user access request stage. Finally,the security of this scheme is proved by security analysis. Compared with the traditional scheme,this scheme saves some computing overhead during the decryption process.
作者 邢维嘉 XING Wei-jia(College of Computer Science and Technology,Taiyuan University of Science and Technology,Taiyuan 030024,China)
出处 《软件导刊》 2020年第9期256-259,共4页 Software Guide
关键词 云计算 属性基加密 访问控制 多授权中心 cloud computing attribute base encryption access control multi-authorization center
  • 相关文献

参考文献4

二级参考文献31

  • 1王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 2张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 3林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 4Sahai A, Waters B. Fuzzy identity based encryption[ C]//Proc of Advances in Cryptology-Eumcrypt. Berlin : Springer, 2005:457-473.
  • 5Shamir A. Identity-based cryptosystems and signature schemes [ C ]/! Proc of Advances in Cryptology. Berlin : Springer, 1984:47453.
  • 6Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data[ C ]//Proc of CCS. New York : ACM Press,2006 : 89- 98.
  • 7Beimel A. Secure schemes for secret sharing and key distribution [ D ]. Israel : Israel Institute of Technology, 1996.
  • 8Li Jin, Au M H, Susilo W, et al. Attribute-based signature and its applications[ C]//Proc of the 5th ACM Symposium on Information Computer and Communications Security. New York: ACM Press, 2010:60 -69.
  • 9Khader D. Attribute based group signatures[ DB/OL]. 2007. http :// eprint, iacr. org/2007/159.
  • 10Li J, Kim K. Attribute-based ring signatures [ DB/OL ]. 2008. ht- tp ://eprint. iaer. org/2008/394.

共引文献328

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部