期刊文献+

支持加密外包的基于属性加密方案 被引量:1

Attribute-based Encryption with Outsourced Encryption
下载PDF
导出
摘要 基于属性加密算法解决了外包环境下数据的安全存储和细粒度访问控制问题,但广泛使用的移动设备难以满足该算法在加密时的性能要求。针对该问题,提出一种支持加密外包的基于属性加密方案。该方案将共享访问策略按照访问树的特点构造为一般矩阵的等价矩阵,将其构造及加密外包给云加密服务器,使得客户端仅需要3次指数运算即可完成一次加密。实验结果表明,该方案能有效应用于移动设备。 The attribute-based encryption solves the problem of secure storage of data and fine-grained access control in the outsourcing environment,but the widely used mobile devices cannot meet the performance requirements of the algorithm when encrypting.In response to this problem,an attribute-based encryption scheme that supports encryption outsourcing is proposed.This scheme constructs the shared access strategy into an equivalent matrix of the general matrix according to the characteristics of the access tree,and outsources its construction and encryption to the cloud encryption server.By using this scheme,the user client only needs three exponential operations to complete one encryption.Experimental results indicate that the scheme can be effectively applied to mobile devices.
作者 冷青松 罗王平 LENG Qingsong;LUO Wangping(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《通信技术》 2021年第9期2242-2246,共5页 Communications Technology
关键词 基于属性加密 外包加密 访问控制 密文共享 attribute-based encryption outsourced encryption access control cipher-text sharing
  • 相关文献

参考文献6

二级参考文献44

  • 1姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1797

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部