期刊文献+

在线/离线非单调CP-ABE方案构造

A compact construction for non-monotonic online/offline CP-ABE
原文传递
导出
摘要 提出了支持非单调访问结构的在线/离线的CP-ABE方案。在离线加密阶段,完成了密文的主要构成部分的计算;在线加密阶段,将正属性集合上的非单调访问控制结构转变成由正、负属性集合上的基于线性秘密共享方案的单调访问控制结构,利用少量的加法和乘法操作生成密文的其余构成部分。在n-(B)假设成立条件下,证明了该方案具有选择性安全性。与原来的非单调CP-ABE方案相比,该方案系统参数和私钥规模保持不变,加密的总体计算复杂度仅有少量增加,但在线加密阶段的计算复杂度较小,可与解密外包服务相结合,使得该方案的离线加密和解密阶段都可在资源受限的小型设备上完成。 We proposed an online/offline ciphertext-policy attribute-based encryption scheme that could support nonmonotonic access structure.In the offline phase,most of the computations for encryption are done;in the online phase,we transform the non-monotonic access structure with positive attribute sets into a monotonic access structure which is based on the linear secret sharing scheme with positive and negative attribute sets,then it only needs a small amount of addition and multiplication operations for the rest components of encryption.The selective security of the scheme under the n-(B) assumption was proved.Compared with the original non-monotonic CP- ABE scheme,our scheme remains the same on the public keys and the master secret keys,with only a small increase in computational complexity.However,the computational complexity during online phase is very small.We can combine our scheme with outsourcing techniques,thus the online encryption phase and the decryption phase could be completed on the resource-constrained small devices.
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2016年第12期78-86,94,共10页 Journal of Shandong University(Natural Science)
基金 河南省基础与前沿技术课题项目(162300410192)
关键词 CP-ABE 在线/离线 非单调访问结构 线性秘密共享方案 选择性安全 CP-ABE online/offline non-monotonic access structure linear secret sharing scheme selective security
  • 相关文献

参考文献2

二级参考文献35

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:99
  • 2靳瑞芳,张建军.基于密码学的身份签密研究[J].计算机技术与发展,2007,17(2):226-228. 被引量:3
  • 3SAHAI A,WATERS B.Fuzzy identity based encryption[A].Proc of the EUROCRYPT[C].Aarhus,Denmark,2005.457-473.
  • 4GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for f'me-grained access control of encrypted data[A].Proe of the 13th ACM Conference on Computer and Communication Security[C].Al-exandria,Vh'ginia,USA,2006.89-98.
  • 5BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attrib-ute-based encryption[A].Proc of the 2007 IEEE Symposium on Secu-rity and Privacy[C].Oakland,California,USA,2007.321-334.
  • 6ATTRAPADUNG N,IMAI H.Dual-Policy attribute based encryp-tiun[A].Applied Cryptography and Network Security[C].Paris,France,2009.168-185.
  • 7CHEUNG L,NEWPORT C.Provably secure ciphertext policy ABE[A].Computer and Communications Security[C].New York,USA,2007.456-465.
  • 8OKAMOTO T,SAHAI A,WATERS B.Attribute-based encryption with non-munotonic access structures[A].Proc of the 14th ACM Con-ference on Computer and Communication Security[C].New York,USA,2007.195-203.
  • 9ATTRAPADUNG N,IMAI H,Conjunctive broadcast and attrib-ute-based encryption[A].Proc of the Pairing-Based Cyptography-Pairing 2009[C].Palo Alto,USA,2009.248-265.
  • 10WANG Y T,CHEN K F,CHEN J H.Atibute-based traitor tracing[J].Journal of Information Science and Engineering,2011,27(1):181-195.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部