期刊文献+

支持快速撤销的ABE算法在个人健康记录云中的研究 被引量:1

A Research on ABE Fast Revocation Algorithm for Personal Health Record Cloud
下载PDF
导出
摘要 个人健康记录(personal health record,PHR)是一种面向个人健康的信息服务。PHR云的诞生方便了病人及医生随时随地地上传、访问以及使用PHR。尽管方便了健康信息的分享,但PHR云也对用户的隐私造成了巨大的威胁,因此急需一种可以同时提供数据保护与访问控制的技术。基于属性的加密算法(attribute-based encryption,ABE)不仅提供了数据加密功能,还支持灵活的访问控制。为了保证前/后向安全性,ABE必须依赖属性撤销以实现对系统中所有属性的动态维护。然而现有的撤销算法的时间复杂度和空间复杂度较高,这阻碍了ABE在PHR云中的应用。为解决该问题,提出了一种支持快速撤销的密文策略属性加密方案(ciphertext policy attribute-based encryption supporting fast revocation,CP-ABE-FR),使得解密者不需要在线频繁更新私钥,同时减少了解密开销。理论分析证明,CP-ABE-FR能够保证PHR安全性。实验数据表明,基于CP-ABE-FR构建的PHR系统访问控制模型在具备较高的加解密计算效率。 Personal health record(PHR)is an information service for personal health.PHR cloud facilities patients and doctors uploading,accessing and using health records anytime and anywhere.Although PHR system facilities sharing of health records,it could cause much threat to users’privacy.Therefore,a kind of technique that provides both secure data protection and access control is urgently needed in the PHR system.Attribute-based encryption(ABE)provides not only secure data protection but also flexible access control.However,current ABE schemes depend on fairly complicated computation of attribute revocation to guarantee forward/backward secrecy,which hinders its application in the PHR system.To address it,a ciphertext policy attribute-based encryption supporting fast revocation(CP-ABE-FR)is designed so that users even do not need to keep online for private keys updating.Meanwhile,decryption overhead is accordingly reduced.Theoretic analysis demonstrates our method guarantees security of PHR.The simulation shows that based on CP-ABE-FR the access control model of PHR system provides high efficiency in data encryption/decryption.
作者 李维勇 张伟 LI Weiyong;ZHANG Wei(School of Network and Communications,Nanjing College of Information Technology,Nanjing Jiangsu 210023,China;School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing Jiangsu 210003,China)
出处 《电子器件》 CAS 北大核心 2021年第3期697-706,共10页 Chinese Journal of Electron Devices
基金 国家自然科学基金项目(61672297) 2019中国特色高水平高职学校和专业建设计划项目(教职成函[2019]14号) 2019年度高校“青蓝工程”优秀教学团队项目(苏教师[2019]3号)。
关键词 个人健康记录 访问控制 属性加密 属性撤销 personal health record access control attribute-based encryption attribute revocation
  • 相关文献

参考文献5

二级参考文献185

  • 1Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer- Verlag, 1994. 480-491.
  • 2Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 3Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi: 10.1007/11535218_16].
  • 4Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology- CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984.47-53.
  • 5Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi: 10.1007/3-540-44647-8_13].
  • 6Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
  • 7Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 8Yu SC, Ren K, Lou WJ. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008.39-44. [doi: 10.1109/NPSEC.2008.4664879].
  • 9Traynor P, Butler K, Enck W, Mcdaniel P. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In: Proc. of the 15th Annual Network and Distributed System Security Symp. (NDSS 2008). San Diego: USENIX Association, 2008.1-13.
  • 10Cheung L, Newport C. Provably secure ciphertext policy ABE. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007.456-465. [doi: 10.1145/1315245.1315302].

共引文献212

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部