期刊文献+

隐藏树型访问结构的属性加密方案 被引量:11

Attribute-based Encryption Scheme with Hidden Tree Access Structures
下载PDF
导出
摘要 在传统的属性加密算法中,加密者把密文消息发送给解密用户的同时,将访问结构一同发给用户,但有时访问结构本身就包含隐私信息.然而,在现有的隐藏访问结构的CP-ABE方案中,大多数方案的访问控制仅仅满足与门结构,无法实现属性密码对于细粒度访问控制的要求.少数满足细粒度访问结构的方案,由于密钥和密文太长以及运算量过大都无法满足现实需求,实用性不强.本文在非对称双线性映射下实现树型访问控制结构,提出一个新的在素数阶群中隐藏树型访问结构的CP-ABE方案.新方案通过密文策略的属性加密(CP-ABE)算法把访问结构隐藏在密文消息中,实现了保护明文和隐藏访问结构的功能,有效解决了用户可以通过分析访问结构得到加密者部分信息以及了解哪些用户可以解密密文的问题.该方案利用非对称DBDH-3假设,在标准模型下证明是完全安全的.与同类的方案相比,新方案不仅实现了细粒度的访问控制结构,而且在密钥和密文减少的同时,提高了运算效率,大大增加了方案在实际应用中的可行性. In most traditional attribute-based encryption schemes, encryptor often sends ciphertext to decryptor along with an access structure, but sometimes the access structure itself contains privacy information. However, existing anonymous ciphertext-policy attribute-based encryption can only support And-gate, those schemes do not meet the demand of attribute-based fine-grained access control structures. A few schemes which achieve fine-grained access structures are far away from practical requirements, because of the long ciphertext and keys and a large amount of computational cost. This paper proposes a new anonymous ciphertext-policy attribute-based encryption scheme over a prime order bilinear group, which is based on access tree by using asymmetric bilinear pairings. This new scheme hides access structure in ciphertext by CP-ABE, which comes to protect the plaintext and hides the access structure. And the problem that decryptor will get related information about encryption by analyzing the access structure and know the identity of eligible users is solved. The scheme relies on the Decision Bilinear Diffie-Hellman Problem in Type3 (DBDH-3) assumptions, and is proven to be fully secure under standard model. Compared with other similar constructions, the performance advantage of the proposed scheme achieves fine-grained access control, and improves efficiency of computation and feasibility in practical applications while reducing key and ciphertext length.
出处 《密码学报》 CSCD 2016年第5期-,共9页 Journal of Cryptologic Research
基金 国家自然科学基金(61262073 61363068 61662009) 贵州省普通高等学校创新人才团队项目(黔教合人才团队字2013-09) 全国统计科研重点项目(2013LZ46) 贵州省统计科学研究课题项目(201511)
关键词 属性基加密 密文策略 隐藏访问结构 非对称双线性对 attribute-based encryption ciphertext policy hidden access structures asymmetry bilinear pairings
  • 相关文献

参考文献4

二级参考文献47

  • 1Sahai A and Waters B. Fuzzy identity-based encryption[C]. In EUROCRYPT 2005, 2005, LNCS 3494: 457-473.
  • 2Goyal V, Pandey O, Sahai A, et al.. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, New York, USA, 2006: 89-98.
  • 3Herranz J, Laguillaumie F, and Rafols C. Constant size ciphertexts in threshold attribute-based encryption[C]. In PKC 2010, 2010, LNCS 6065: 19-34.
  • 4Waters B. Ciphertext-policy attribute-based encryption: anexpressive, efficient, and provably secure realization[C]. In PKC 2011, 2011, LNCS 6571: 53-70.
  • 5Attrapadung N, Libert B, and Panafieu E. Expressive key-policy attribute-based encryption with constant-size ciphertexts[C]. In PKC 2011, 2011, LNCS 6571: 90-108.
  • 6Nishide T, Yoneyama K, and Ohta K. Attribute-based encryption with partially hidden encryptor-specified access structures[C]. In ACNS 2008, 2008, LNCS 5037: 111-129.
  • 7Lai J, Deng R H, and Li Y. Fully secure cipertext-policy hiding CP-ABE[C]. In ISPEC 2011, 2011, LNCS 6672: 24-39.
  • 8Freeman D M. Converting pairing-based cryptosystems from composite-order groups to prime-order groups[C]. In EUROCRYPT 2010, 2010, LNCS 6110: 44-61.
  • 9Lewko A and Waters B. New techniques for dual system encryption and fully secure HIBE with short ciphertexts [EB/OL]. http://eprint.iracr.org/2009/482, 2009.
  • 10Waters B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions[C]. In CRYPTO 2009, 2009, LNCS 5677: 619-636.

共引文献93

同被引文献50

引证文献11

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部