期刊文献+

基于时间因子的可撤销可追踪属性基加密方案

A time factor based revocable and traceable attribute-based encryption scheme
下载PDF
导出
摘要 现有的属性基加密方案访问策略中较少涉及时间因子,用户为自己的数据设置访问策略时,无法对访问数据的用户拥有属性的时间进行限定,针对恶意泄露密钥的用户进行追踪并撤销也是属性基加密中的挑战性问题,现有的可撤销方案存在计算量太大、效率过低等缺陷。针对这些问题,提出一种基于时间因子的可撤销可追踪属性基加密方案,在用户密钥中分别标记用户获取属性的时间,访问策略中对用户获取属性最早/最迟时间进行限定,解密时对用户属性时间进行验证,丰富了系统的访问策略并实现了方案的后向安全,通过时间验证服务器对用户解密阶段进行管理,用户属性撤销时仅需要更新用户时间标记因子,用户撤销时仅需要删除时间因子,实现方案高效撤销和前向安全。最后,在DBDH假设下,所提方案是IND-CPA安全的。性能分析和实验结果表明,所提方案有较丰富的功能和较高的性能。 Existing access policies of attribute-based encryption schemes seldom involve the time factor.When users set access policies for their own data,it is impossible to limit the time when the users who access the data have the attributes.It is also a challenging problem in attribute-based encryption to track and revoke a user who leaks the key maliciously,and the existing revocable schemes are too computationally intensive and inefficient.To address these problems,a revocable and traceable attribute-based encryption scheme based on time factor is proposed.In the scheme,the user’s access time is marked in the user key,the earliest/latest time of the user’s attribute acquisition can be limited in the access policy,and the time of the user’s attribute acquisition is verified during decryption,which enriches the access policy of the system and realizes the backward security of the scheme.The decryption phase is managed by the time verification server,and only the user time tag factor needs to be updated when the user attributes are revoked,and only the time factor needs to be deleted when the user is revoked,so as to achieve efficient revocation and forward security of the scheme.Finally,under the assumption of DBDH,the proposed scheme is IND-CPA secure.The performance analysis and experimental results show that the proposed scheme has richer features and higher performance.
作者 许城洲 王晨 张文涛 XU Cheng-zhou;WANG Chen;ZHANG Wen-tao(China Aerospace Academy of Systems Science and Engineering,Beijing 100037;China Aerospace Science and Technology Corporation,Beijing 100048,China)
出处 《计算机工程与科学》 CSCD 北大核心 2023年第2期286-294,共9页 Computer Engineering & Science
关键词 密文策略属性基加密 用户撤销 用户属性撤销 前后向安全 基于时间访问控制 ciphertext-policy attribute-based encryption(CP-ABE) user revocation user attribute revocation forward and backward security time-based access control
  • 相关文献

参考文献4

二级参考文献40

  • 1Sahai A, Waters B. Fuzzy identity-based eneryption [G] //LNCS 3494: Proc of EUROCRYPT'05. Berlin.. Springer, 2005 : 457-473.
  • 2Cheung L, Newport C. Provably secure ciphertext policy ABE [C] //Proc of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007:456-465.
  • 3Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C] //Proc of IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2007: 321- 334.
  • 4Pirretti M, Traynor P, McDaniel P, et al. Secure attribute based systems [J]. Journal of Computer Security, 2010, 18 (5) : 799-837.
  • 5Boldyreva A, Goyal V, Kumar V. Identity-based encryption with efficient revocation [C]//Proc of the 15th ACM Conf on Computer and Commurdcations Security. New York: ACM, 2008:417-426.
  • 6Hut J, Noh D K. Attribute-based access control with efficient revocation in data outsoureing systems [J]. IEEE Trans on Parallel and Distributed Systems, 2011, Z2 (7): 1214-1221.
  • 7Wang Guojun, Liu Qin, Wu Jie. Hierarchical attribute-base encryption for fine-grained access control in cloud storage services [C] //Proc of the 17th ACM Conf on Computer and Communications Security. New York: ACM, 2010:735-737.
  • 8Yu Shucheng, Wang Cong, Ren Kui, et al. Attribute based data sharing with attribute revocation [C] //Proc of the 5th ACM Symp on Inforraation, Computer and Communications Security. New York: ACM, 2010:261-270.
  • 9Zhu Jun, Zhang Futai, Song Xiaodong. A new certificateless proxy re-encryption scheme [C] //Proc of IEEE Int Conf on Web Information Systems and Mining. Piscataway, NJ: IEEE, 2010:53-58.
  • 10Ihraimi L, Petkovic M, Nikova S, et al. Mediated ciphertext-policy attribute based encryption and its application [G]n LNCS 5932: Proc of Information Security Applications. Berlin: Springer, 2009:309-323.

共引文献81

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部