期刊文献+

一种基于属性的固定密文长度广播加密方案 被引量:4

Attribute-based broadcast encryption scheme with constant ciphertext size
在线阅读 下载PDF
导出
摘要 针对目前基于属性的广播加密方案存在密文较长、加/解密时计算花销较大等问题,提出了一种高效的密文策略的基于属性的广播加密方案。该方案基于椭圆曲线加密算法,采用动态门限访问结构,加密方可根据需要动态调整门限值。该方案仅当用户的身份信息包含在广播的授权用户集合中且用户的属性包含在访问结构中时,解密方方可通过双线性配对运算进行密文解密。方案的密文长度及加/解密双线性对运算次数固定,计算效率高且通信开销小。仿真结果验证了方案的有效性。方案安全性是建立在q-BDHE假设之上,在标准模型下可证CPA安全。 There are lots of drawbacks in present attribute-based broadcast encryption schemes,such as high computational cost of encryption and decryption,and low transmission efficiency due to its long ciphertext. In order to solve these problems,this paper presented an efficient ciphertext policy attribute-based broadcast encryption scheme. The scheme based on elliptic curve encryption algorithm used dynamic threshold access structure and the threshold value could be adjusted dynamically according to the need by the encrypting party. A user could decrypt the ciphertext by bilinear pairing operations only if its identity information was included in the broadcast set and its attributes satisfied the access policy. In the scheme,the ciphertext size and the bilinear pairing operation times in encryption and decryption was constant,which could reduce the overhead of broadcast communication and ensure the high efficiency. The simulation results verify the effectiveness of the scheme. In additional,the security of scheme which can be proved under the decisional q-bilinear Differ-Hellman exponent assumption has CPA secure in the standard model.
出处 《计算机应用研究》 CSCD 北大核心 2016年第6期1780-1784,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61272084 61202004 61202353 61300240 61302158) 江苏省自然科学基金资助项目(BK2011754) 江苏省高校自然科学研究重大项目(11KJA520002)
关键词 属性广播加密 椭圆曲线加密 访问结构 固定密文长度 效率 安全性 attribute-based broadcast encryption elliptic curve encryption access structure constant ciphertext size efficiency security
  • 相关文献

参考文献21

  • 1Fiat A,Naor M.Broadcast encryption[C] //Advances in Cryptology.Berlin:Springer,1994:480-491.
  • 2Sahai A,Waters B.Fuzzy identity-based encryption[C] //Advances in Cryptology-EUROCRYPT.Berlin:Springer,2005:457-473.
  • 3Delerablee C,Paillier P,Pointcheval D.Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys[M].Berlin:Springer,2007:39-59.
  • 4Gentry C,Waters B.Adaptive security in broadcast encryption systems(with short ciphertexts)[M].Berlin:Springer,2009:171-188.
  • 5Delerablée C.Identity-based broadcast encryption with constant size ciphertexts and private keys[C] //Proc of International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2007:200-215.
  • 6Naor M,Pinkas B.Efficient trace and revoke schemes[C] //Proc of Financial Cryptography.Berlin:Springer,2001:1-20.
  • 7Boneh D,Franklin M.Identity-based encryption from the Weil pairing[C] //Advances in Cryptology.Berlin:Springer,2001:213-229.
  • 8Du Xinjun,Wang Ying ,Ge Jianhua,et al.An ID-based broadcast encryption scheme for key distribution[J].IEEE Trans on Broadcasting,2005,31(2):264-266.
  • 9Yang Geng,Wang Jiangtao,Cheng Hongbing.An identity-based encryption scheme for broadcasting[C] //Proc of IFTP International Conference on Network and Parallel Computing.Berlin:Springer,2007:123-126.
  • 10Boneh D,Gentry C,Waters B.Collusion resistant broadcast encryption with short ciphertexts and private keys[C] //Advance in Cryptology.Berlin:Springer,2005:258-275.

二级参考文献11

  • 1Flat A,Naor M.Broadcast encryption[C]// CRYPTO 1993.Springer-Verlag,1994:480-491.
  • 2JHO N S,Huang J Y,Cheon J H.One-way chain based broadcast encryption schemes[C]//EUROCRYPT 2005.SpringerVerlag,2005:559-74.
  • 3Huang J Y,Lee D H,Lim J I.Generic transformation for scalable broadcast encryption[C]//CRYPTO 2005.Springer-verlag.2005:276-292.
  • 4Naor M,Pinkas B.Efficient trace and revoke schemes[C]//FC2000.Springer-Verlag.2001:1-20.
  • 5Boneh D,Gentry C,Waters B.Collusion resistant broadcast encryption with short ciphertexts and private keys[C]//CRYPTO 2005.Springer-Verlag,2005:258-275.
  • 6Jong H P,Hee J K,Maeng H S.Public key broadcast encryption schemes with shorter transmissions[J].IEEE transactions on broadcasting,2008,54(3):401-410.
  • 7Sahai A,Waters B.Fuzzy identity-based eneryption[C]//EUROCRYPT 2005.Springer-Verlag,2005:457-473.
  • 8Vipul G,Omkant P,Amit S.Attribute-based encryption for fine grained access control of encrypted data[C]//Proceedings of the 2006 ACM conference on computer and communications security.2006:89-98.
  • 9Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE symposium on security and privacy.2007:321-334.
  • 10David L,Thomas S.Made EffcientS.Attribute-based broadcast encryption scheme made efficient[C]//AFRICACRYPT 2008.Springer-Verlag,2008:325-342.

同被引文献12

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部