期刊文献+

支持电路结构的属性基加密研究综述 被引量:2

Review on attribute-based encryption for circuits
下载PDF
导出
摘要 支持电路结构的属性基加密(attribute-based encryption,ABE)方案是在实现机密性和数据完整性的基础上,克服传统密码的访问控制单一等缺点,抵御“回溯攻击”提高信息安全性的一种新方法。指出电路结构的ABE机制并进行深入研究与讨论,分别分析和总结支持电路结构的基于密钥策略的加密属性(key-policy attribute-based encryption,KP-ABE)和基于密文策略加密属性(ciphertext-policy attribute-based encryption,CP-ABE)的设计和构造,提出现存的一些难题,并展望电路结构ABE的未来研究前景。 The attribute-based encryption(ABE)scheme supporting the circuit structure,which is based on the realization of confidentiality and data integrity,is a new approach to overcome the shortcomings of traditional passwords such as single access control and to resist"backtracking attacks"to improve information security.The ABE mechanism of the circuit structure is summarised and discussed,especially on the design and construction of the key-policy attribute-based encryption(KP-ABE)and (the ciphertext-policy attribute-based encryption,CP-ABE).The existing problems and the future research prospects of circuit structure ABE are also discussed.
作者 吴青 李良俊 马旭金 WU Qing;LI Liangjun;MA Xujin(School of Automation,Xi'an University of Posts and Telecommunications,Xi'an 710121,China)
出处 《西安邮电大学学报》 2020年第4期1-7,18,共8页 Journal of Xi’an University of Posts and Telecommunications
基金 国家自然科学基金项目(51875457) 陕西省重点研发计划项目(2018GY-018)。
关键词 属性基加密 访问控制 通用电路 attribute-based encryption access control general circuit
  • 相关文献

参考文献9

二级参考文献52

  • 1ZHENG Dong,LI Xiangxue,CHEN Kefei.LFSR-based Ring Signature Scheme[J].Chinese Journal of Electronics,2007,16(3):397-400. 被引量:3
  • 2Sahai A,Waters B.Fuzzy identity-based encryption[C]//Cramer R.Advances in Cryptology-EUROCRYPT 2005.Berlin,Heidelberg:Springer-Verlag,2005:457-473.
  • 3Herranz J,Laguillaumie F,Rafols C.Constant-size cipher-texts in threshold attribute-based encryption[C]//Nguyen PQ,Pointcheval D.PKC 2010,LNCS 6056:19-34.
  • 4GeAijun,Zhang Rui,Chen Cheng,et al.Threshold cipher-text policy attribute-based encryption with constant size ci-phertexts[C]//Information Security and Privacy.2012,LNCS 7372:336-349.
  • 5Agrawal S,Boyen X,Vaikuntanathan V,et al.Functional en-cryption for threshold functions (or Fuzzy IBE) from lattices[C]//Public Key Cryptography-PKC 2012.2012,LNCS7293:280-297.
  • 6SunChangxia,Ma Wenping.Secure attribute-based thresholdsignature without a trusted central authority[J].Jouml ofComputers,2012,7( 12):2899-2905.
  • 7Goyal V,Pandey 0,Sahai A,et al.Attribute-based encryp-tion for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer andCommunications Security.New York:ACM Press,2006:89Ostrovsky R,Sahai A,Waters B.Attribute-based encryptionwith non-monotonic access structures[C]//Proceedings ofthe ACM Conference on Computer and Communications Se-curity-New York:ACM Press,2007; 195-203.
  • 8Waters B.Ciphertext-policy attribute-based encryption:Anexpressive,efficient,and provably secure realization[C]//Catalano D,Catalano N.Procedings of the Public Key Cryp-tography ( PKC 2011).Berlin:Springer-Verlag,2011:53-70.
  • 9Chen Cheng,Chen Jie,Lim Hoonwei,et al.Combined pub-lic-key schemes:The case of ABE and ABS[C]//ProvSec2012.2012,LNCS 7496:53-69.
  • 10Sahai A,Seyalioglu H,Waters B.Dynamic credentials andciphertext delegation for attribute-based encryption[C]//Advances in Cryptology-CRYPTO 2012.2012,LNCS7417:199-217.

共引文献79

同被引文献19

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部