期刊文献+

支持属性撤销和解密外包的属性基加密方案 被引量:13

Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing
在线阅读 下载PDF
导出
摘要 为了有效地解决属性基加密中属性的撤销问题,减少解密过程中用户的计算量,提出了具有撤销和解密外包功能的属性基加密方案.新方案利用线性秘密共享技术实现了秘密的分割与重组,基于密钥加密密钥树实现了密钥的更新.在解密过程中,将部分解密运算外包给解密服务器,减少了用户的计算代价.安全性分析表明,新方案能够抵抗共谋攻击,保证数据的机密性和前向、后向安全性.仿真实验表明,新方案在密文更新和解密过程中所需时间都有很大程度降低. Aiming to tackle the attribute revocation issue and reduce the user's computational overheads, an attribute-based encryption scheme is proposed and it can support attribute revocation and deeryption outsoureing. In the proposed scheme, the splitting and reconstruction of secrets is realized by the linear secret sharing technique, and key update is based on the KEK(Key Encrypting Key) tree. In decryption, our scheme outsources some decryption computational tasks to a decryption service provider, which reduces the computational cost on users' side. Security analysis indicates that the proposed scheme can resist collusion attack, and ensure data confidentiality and forward/backward secrecy. Experimental results show that the efficiency of ciphertext update and decryption is improved in terms of time cost.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2015年第6期6-10,55,共6页 Journal of Xidian University
基金 国家自然科学基金资助项目(61472470 61100229) 陕西省自然科学基金资助项目(2014JM2-6091)
关键词 属性基加密 属性 撤销 外包 attribute-based encryption attribute revocation outsourcing
  • 相关文献

参考文献13

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 2朱旭东,李晖,郭祯.云计算环境下加密图像检索[J].西安电子科技大学学报,2014,41(2):151-158. 被引量:12
  • 3Sahai A,Waters B.Fuzzy Identity-based Encryption[C]//Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,2005:457-473.
  • 4Waters B.Ciphertext-policy Attribute-based Encryption:an Expressive,Efficient,and Provably Secure Realization [C]//Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography.Berlin:Springer,2011:53-70.
  • 5Boldyreva A,Goyal V,Kumar V.Identity-based Encryption with Efficient Revocation [C]//Proceedings of the ACM Conference on Computer and Communications Security.New York:ACM,2008:417-426.
  • 6Hur J,Noh D K.Attribute-based Access Control with Efficient Revocation in Data Outsourcing Systems[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(7):1214-1221.
  • 7Xie X,Ma H,Li J,et al.An Efficient Ciphertext-policy Attribute-based Access Control towards Revocation in Cloud Computing[J].Journal of Universal Computer Science,2013,19(16):2349-2367.
  • 8Zhang Y,Chen X,Li J,et al.Anonymous Attribute-based Encryption Supporting Efficient Decryption Test[C]//Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security.New York:ACM,2013:511-516.
  • 9Fan C I,Huang V S M,Rung H M.Arbitrary-state Attribute-based Encryption with Dynamic Membership[J].IEEE Transactions on Computers,2014,63(8):1951-1961.
  • 10Atallah M J,Pantazopoulos K N,Rice J R,et al.Secure Outsourcing of Scientific Computations[J].Advances in Computers,2002,54:215-272.

二级参考文献41

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1082

同被引文献47

引证文献13

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部