期刊文献+

基于属性加密的可撤销机制研究综述 被引量:2

Overview of Research on the Revocable Mechanism of Attribute-Based Encryption
下载PDF
导出
摘要 属性基加密是实现群组通信系统中数据文件细粒度访问控制的重要密码学技术。群组通信系统存在用户加入、退出、属性变更等情况,因此实现用户或属性级撤销的属性基加密是必须要解决的问题。文章在对可撤销的属性基加密方案的分类情况和构造进行研究的基础上,阐述了可撤销属性基加密方案的研究方向和进展,分别从直接撤销、间接撤销和混合撤销3种撤销机制对已有的可撤销属性基加密方案进行深入分析和综合对比,同时指出了可撤销属性基加密机制存在的不足及未来的研究方向。 Attribute-based encryption is an important cryptographic technique for achieving fine-grained access control of data files in group communication systems.However,addressing the revocation of users or attributes is crucial due to the existence of user joining,exiting,and attribute changing in group communication systems.Based on the classification and construction of revocable attribute-based encryption schemes,this paper focused on the research progress and development of revocable attribute-based encryption schemes.This paper provided a comprehensive analysis and comparison of existing revocable attribute-based encryption schemes from three revocation mechanisms:direct revocation,indirect revocation,and hybrid revocation.At the same time,discussing the shortcomings and issues of revocable attribute-based encryption mechanisms and possible future directions.
作者 李莉 朱江文 杨春艳 LI Li;ZHU Jiangwen;YANG Chunyan(Department of Electronic and Communication Engineering,Beijing Electronic Science and Technology Institute,Beijing 100070,China;School of Computer Science and Technology,Xidian University,Xi’an 710071,China)
出处 《信息网络安全》 CSCD 北大核心 2023年第4期39-50,共12页 Netinfo Security
基金 国家重点研发计划[2017YFB0801803] 北京高校“高精尖”学科建设项目[20210093Z0402] 教育部一流本科专业建设项目[gjylzy2021001]。
关键词 属性基加密 直接撤销 间接撤销 混合撤销 attribute-based encryption direct revocation indirect revocation hybrid revocation
  • 相关文献

参考文献10

二级参考文献44

  • 1Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology--EUROCRYPT 2005. Berlin: Springer-Verlag, 2005.457-473. [doi: 10.1007/11426639_27].
  • 2Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 3Ostrovsky R, Sahai A, Waters B. Attribute-Based encryption with non-monotonic access structures. In: Proc. of the 14th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007. 195-203. [doi: 10.1145/1315245.1315270].
  • 4Attrapadung N, Imai H. Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B, eds. Proc. of the Pairing-Based Cryptography--Pairing 2009. Berlin: Springer-Verlag, 2009.248-265. [doi: 10.1007/978-3-642-03298-1_16].
  • 5Attrapadung N, Imai H. Attribute-Based encryption supporting direct/indirect revocation modes. In: Parker MG, ed. Proc. of the Cryptography and Coding. Berlin: Springer-Verlag, 2009. 278-300. [doi: 10.1007/978-3-642-10868-6_17].
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-Poliey attribute-based encryption. In: Proc. of the 2007 IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2007. 321-334. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?amumber=4223236 [doi: 10.1109/SP.2007.11].
  • 7Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Catalano D, Catalano N, eds. Proc. of the Public Key Cryptography (PKC 2011). Berlin: Springer-Verlag, 2011. 53-70. [doi: 10.1007/978-3- 642-19379-8_4].
  • 8Su JS, Cao D, Wang XF, Sun YP, Hu QL. Attribute based encryption schemes. Journal of Software, 2011,22(6): 1299-1315 (in Chinese with English abstract), http://www.jos.org.cn/1000-9825/3993.htm [doi: 10.3724/SP.J.1001.2011.03993].
  • 9Hanaoka Y, Hanaoka G, Shikata J, Imai H. Identity-Based hierarchical strongly key-insulated encryption and its application. In: Roy B, cd. Advances in Cryptology--ASIACRYPT 2005. Berlin: Springer-Verlag, 2005. 495-514. Idol: 10.1007/11593447_27].
  • 10Boldyreva A, Goyal V, Kumar V. Identity-Based encryption with efficient revocation. In: Proc. of the 15th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2008. 417-426. [doi: 10.1145/1455770.1455823].

共引文献115

同被引文献5

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部