期刊文献+

支持策略更新和即时密文验证的外包属性基加密方案

Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext
下载PDF
导出
摘要 属性基加密提供了全新的基于密码学的访问控制方案,适用于多用户数据共享场景,但由于加密阶段和访问策略更新过程的计算和通信开销较大,且现有的外包属性基加密方案大多数都没有提供面向数据拥有者的密文正确性验证方法,很大程度上限制了属性基加密的实际应用.针对上述问题,提出了一种支持动态策略更新和即时验证密文正确性的属性基外包加密方案,能够在不可信云环境下有效地保护数据的隐私性.方案根据外包加密原理设计策略更新过程,只需要完成少量计算即可生成更新密钥.利用双线性对的运算特性和解密运算结构设计密文验证算法,通过引入验证转换密钥使密文验证效率明显高于解密运算效率.方案根据不同的云环境模型设计了高效验证算法和严格验证算法,分别适用于诚实且好奇和不可信的云环境中.方案在标准模型下被证明满足选择明文攻击安全性.性能分析和效率对比表明,该方案的本地加密、策略更新和密文验证的计算量都有所减少,使得整体方案较现有方案更加轻量化,适用于资源受限设备的数据共享场景. Attribute-based encryption is a new access control scheme based on cryptography,which is suitable for data sharing.However,the large computational and communication costs of encryption and access policy updating limit the practical application of attribute-based encryption.Moreover,most of proposed outsourcing ABE schemes do not provide a ciphertext correctness verification method for data owners.Thus,an outsourced ABE scheme with dynamic policy updating and real-time verification of ciphertext correctness is proposed to further protect data privacy in an untrusted cloud environment.In the scheme,the design of policy updating references outsourced encryption,which reduces the computational cost of generating update key.The design of ciphertext correctness verification algorithm refers to decryption operation and introduces verification transformation key to make ciphertext verification more efficient.According to different cloud environment models,efficient verification algorithm and strict verification algorithm are designed,which are suitable for honest but curious cloud environment and untrustworthy cloud environment respectively.The scheme is secure against chosen plaintext attack under the standard model.Performance analysis and efficiency comparison show that the computation of local encryption,policy updating and ciphertext verification are reduced,and the scheme is more lightweight,which is suitable for the application of computation-constrained devices in access control scenarios.
作者 苏泽林 张文芳 王小敏 Su Zelin;Zhang Wenfang;Wang Xiaomin(School of Information Science and Technology,Southwest Jiaotong University,Chengdu 610756)
出处 《计算机研究与发展》 EI CSCD 北大核心 2024年第12期3088-3097,共10页 Journal of Computer Research and Development
基金 国家自然科学基金项目(U2468201) 四川省科技计划项目(2024ZHCG0001)。
关键词 属性基加密 策略更新 密文重加密 外包加密 可验证密文 attribute-based encryption policy updating ciphertext re-encryption outsourced encryption verifiable ciphertext
  • 相关文献

参考文献5

二级参考文献41

  • 1YU S, WANG C, REN K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[A]. INFOCOM, 2010 Proceedings IEEE[C]. 2010. 1-9.
  • 2SAHAI A, WATERS B. Fuzzy Identity-Based Encryption[M]. Springer Berlin Heidelberg, 2005.
  • 3GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for free-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Secu- rity[C]. ACM, 2006.89-98.
  • 4BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attrib- ute-based encryption[A]. Security and Privacy[C]. 2007.321-334.
  • 5WATERS B. Ciphertext-Policy Attribute-Based Encryption: An Ex- pressive, Efficient, and Provably Secure Realization[M]. Springer Ber- lin Heidelberg, 2011.
  • 6CHASE M. Multi-Authority Attribute based Encryption[M]. Theory of Cryptography. Springer Berlin Heidelberg, 2007.
  • 7LEWKO A, WATERS B. Decentralizing Attribute-based Encryp- tion[M]. Springer Berlin Heidelberg, 2011.
  • 8LIU Z, CAO Z, HUANG Q, et al. Fully secure multi-authority cipher- text-policy attribute-based encryption without random oracles[A]. Computer Security-ESORICS 2011[C]. Springer Berlin Heidelberg, 20 l 1. 278-297.
  • 9SAHAI A, SEYALIOGLU H, WATERS B. Dynamic credentials and ciphertext delegation for attribute-based encryption[A]. Advances in Cryptology2RYPTO 2012[C]. Springer Berlin Heidelberg, 2012. 199-217.
  • 10YANG K, JIA X, PEN K, et al. Enabling efficient access control with dynamic policy updating for big dam in the cloudA. 1NFOCOM, 2014 Proceedings IEEE[C]. 2014. 2013-2021.

共引文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部