期刊文献+

固定密文长度的可验证属性基外包解密方案

Efficient verifiable outsourced decryption based on attribute-based encryption and fixed ciphertext length
在线阅读 下载PDF
导出
摘要 传统密钥策略属性基加解密方案存在密文长度随着属性增加而线性增加,在通信过程中消耗用户大量的通信带宽的缺点。提出了属性加密的改进方案,基于密钥策略属性加密,提出具有固定密文长度的可验证外包解密方案,在非单调访问结构实现密文长度固定,有效节省通信带宽,通过对外包密钥生成算法的改进,实现一次模指数运算,有效缩短外包密钥生成时间。通过运用哈希函数,实现外包解密的验证性,并对其安全性进行了证明。 The traditional key policy attribute base encryption and decryption scheme has the disadvantages that the ciphertext length increases linearly with the increase of the number of attributes, and consumes a large amount of communication bandwidth of the user in the communication process. The improved scheme of attribute encryption was proposed. Based on the encryption of key policy attributes, a verifiable packet decryption scheme with fixed ciphertext length was proposed. In the non-monotonic access structure, the cipher length was fixed, and the communication bandwidth was effectively saved. Through the improvement of outsourced key generation algorithm, a primary modular exponentiation operation was realized, and the generation time of key generation was effectively shortened. The hash function was used to realize the verification of the decryption and its security was proved.
出处 《计算机应用》 CSCD 北大核心 2017年第11期3299-3303,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(U1636114 61572521) 陕西省自然科学基础研究计划项目(2016JQ6037)~~
关键词 密钥策略属性基加密 外包解密 可验证性 云计算 Key-Policy Attributed-Based Encryption (KP-ABE) outsourced description verifiability cloud computing
  • 相关文献

参考文献3

二级参考文献52

  • 1Sahai A, Waters B. Fuzzy identity-based encryption [ A ]. Aarhus: Advances in Cryptology-EUROCRYPT 2005 [ C ]. Berlin: Springer,2005.457 - 473.
  • 2Bethencourt J, Sabai A, Waters B. Ciphertext-policy attribute- based encryption[ A]. Procceedmgs of the 2007 IEEE Security and Privacy[ C]. Oakland:IEEE, 2007.321 - 334.
  • 3Yang K, Jia X,Ren K. Atlribute-based fine-grained access con- trol with efficient revocation in cloud storage systems[ A]. Pro- ceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security [ C ]. Berlin: ACM, 2013.523 - 528.
  • 4S Yu,C Wzng,K Ren,W Lou.Achieving secure,scalable, and fme-grained data access control in computing[A]. Proceedings of the 2010 IEEE INPCCOM[C] .San Diego:IEEE,2010. 1-9.
  • 5J Hur, D K Noh. Attribute-based access control with efficient re-vocation in data outsourcing systems[ J ]. IEEE Transactions on Parallel and Distributed Systems,2011,22(7):1214- 1221.
  • 6Zhou Z, Huang D. On efficient ciphertext-policy attribute based enclyption and broadcast encryption [ A ]. Proceedings of the 17th ACM Conference on Computer and Communications Se- curity[ C]. Chicago: ACM,2010.753 - 755.
  • 7Shamir A. How to share a secret [ J ]. Communications of the ACM, 1979,22(11) :612 - 613.
  • 8Hohenberger S,Waters B. Attribute-based encryption with fast decrypfion [ A ]. Public-Key CYyptography-PKC 2013 [ C ]. Berlin: Springer,2013.162 - 179.
  • 9Waters B. Ciphertext-policy attribtg.e-based encryplion: An ex- pressive, efficient, and provably secure realization [ A ]. Public Key O3qXOgalYay-PKC 2011[C] .Berlin: Spdnger,2011.53 - 70.
  • 10Lewko A, Okamoto T, Sahai A, et al. Fully secure functional encryption: Atlribute-based encryption and (hierarchical) inner product encryption [ A ]. Advances in Cryptology-EURO- CRYPT 2010[ C]. Berlin: Springer, 2010.62 - 91.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部