期刊文献+

支持直接撤销的固长密文策略属性基加密方案 被引量:4

Direct Revocable Ciphertext Policy Attribute-Based Encryption Scheme with Constant-Size Ciphertext
下载PDF
导出
摘要 该文提出一种支持直接撤销功能且具有固定长度的密文策略属性基加密方案,首先给出了该属性基加密方案的形式化定义和安全模型,然后对方案具体的实现进行了阐述,最后给出了该方案在标准模型下的安全性证明。该方案在密文长度和解密开销固定的同时,允许用户在加密过程中将撤销列表嵌入到密文中以实现直接撤销,保证了仅当用户所拥有的属性满足密文访问结构且用户身份没有出现在撤销列表的前提下,才可以使用自己的私钥解密执行解密。对比分析结果表明,该方案较同类方案具有更高的计算效率且支持更灵活的访问结构。 By considering the dynamic user access privilege and the potential leakage of secret key,a direct revocable ciphertext policy attribute-based encryption(usually shorten as CP-ABE)scheme with constant-size ciphertext is proposed in this paper.Different from the indirect revocable CP-ABE,the proposed approach allows the data owner to assign the revoked users during the encryption without interacting the attribute authority periodically.The definition and security model of the direct revocable attribute-based encryption scheme are given and a concrete scheme is also constructed correspondingly.The security proof of the scheme is given under the standard model.The results of comparative analysis show that the scheme achieves higher computational efficiency and supports more flexible access structure than the state-of-the-art.
作者 朱国斌 谢鑫 张星 赵洋 熊虎 ZHU Guo-bin;XIE Xin;ZHANG Xing;ZHAO Yang;XIONG Hu(School of Information and Software Engineering,University of Electronic Science and Technology of China,Chengdu 610054;Network and Data Security Key Laboratory of Sichuan Province,Chengdu 610054)
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2021年第1期76-83,共8页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(61602096) 四川省国际科技创新合作/港澳台科技创新合作项目(2020YFH0062)。
关键词 属性基加密 访问结构 密文策略 直接撤销 attribute-based encryption access structure ciphertext policy direct revocation
  • 相关文献

参考文献2

二级参考文献21

  • 1SAHAIA,WATERS B.Fuzzy identity based encryption[A].Proc of the Eurocrypt 2005[C].Heidelberg:Springer-Verlag,2005.457-473.
  • 2GOYAL V,PANDEY O,et al.Attribute-based eneryption for free-grained access control of encrypted data[A].Proc of the 13th ACM CCS[C].New York,2006.89-98.
  • 3WATERS B.Ciphertext-policy attribute based encryption:an expres-sive,efficient and provably secure realization[A].Proc of the PKC 2011 [C].Heidelberg:Springer-Verlag,2011.53-70.
  • 4CHASE M.Multi-authority attribute based encryption[A].Proc of the TCC 2007[C].Heidelberg:Springer-Verlag,2007.515-534.
  • 5CHASE M,CHOW S.Improving privacy and security in multi-authority attribute-based encryption[A].Proc of the 16thACMCCS[C].New York,2009.121-130.
  • 6LEWKO A,WATERS B.Decentralizing attribute-based encryption[A].Proc of the Eurocrypt 2011[C].Heidelberg:Springer-Verlag,2011.568-588.
  • 7LEWKO A,WATERS B.New proof methods for attribute-based en-cryption:achieving full security through selective techniques[A].Proc of the Crypto 2012[C].Heidelberg:Springer-Verlag,2012.180-198.
  • 8HOHENBERGER S,et al.Attribute based encryptiun:with fast de-cryption[A].Proc of the PKC 2013[C].Heidelberg:Springer-Verlag,2013.162-179.
  • 9ANDERSON R.Two Remarks on Public Key Cryptology[R].Invited Lecture at the 4th ACM Conference on Computer and Communica-tions Security,1997.
  • 10BELLARE M,MINER S K.A forward-secure digital signature scheme[A].Proc of the Crypto 1999[C].Heidelberg:Springer-Verlag,1999.431-448.

共引文献24

同被引文献32

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部