期刊文献+

属性密码学研究 被引量:51

Research on Attribute-based Cryptography
下载PDF
导出
摘要 属性密码学作为一种新型的密码学原语,是近年来密码学研究中的一个热门方向,它可以有效实现细粒度的非交互访问控制机制,并具有广泛的应用前景.本文系统地论述了当前属性密码学的研究现状和发展趋势,并就主流研究工作进行了深入探讨和分析,其主要内容包括:属性密码学基本概念、可证明安全的方案和近年来的研究进展情况,同时,讨论了未来需要进一步研究解决的问题. As a new cryptographic primitive, attribute-based cryptography is an attractive research topic in recent years. It provides a fine-grained and non-interactive access control mechanism of encrypted data and has great potential applications. Through an in-depth study of the major work on this topic, this paper presents a survey on the research status and development trend of attribute-based cryptography. It reviews the basic concepts of attribute-based cryptography, the development of provably secure schemes and some results of the most recent research. Finally, this paper discusses some problems that need to be solved in the future.
作者 冯登国 陈成
出处 《密码学报》 2014年第1期1-12,共12页 Journal of Cryptologic Research
基金 国家重点基础研究发展项目(973计划)(2013CB338003) 国家自然科学基金项目(91118006)
关键词 密码学 属性密码学 访问控制 cryptography attribute-based cryptography access control
  • 相关文献

参考文献3

二级参考文献97

  • 1Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer- Verlag, 1994. 480-491.
  • 2Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 3Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi: 10.1007/11535218_16].
  • 4Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology- CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984.47-53.
  • 5Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi: 10.1007/3-540-44647-8_13].
  • 6Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
  • 7Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 8Yu SC, Ren K, Lou WJ. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008.39-44. [doi: 10.1109/NPSEC.2008.4664879].
  • 9Traynor P, Butler K, Enck W, Mcdaniel P. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In: Proc. of the 15th Annual Network and Distributed System Security Symp. (NDSS 2008). San Diego: USENIX Association, 2008.1-13.
  • 10Cheung L, Newport C. Provably secure ciphertext policy ABE. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007.456-465. [doi: 10.1145/1315245.1315302].

共引文献142

同被引文献372

引证文献51

二级引证文献235

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部