期刊文献+

可追踪密钥的策略隐藏属性基加密方案 被引量:4

Policy-hidden attribute-based encryption scheme with traceable keys
在线阅读 下载PDF
导出
摘要 传统的属性基加密方案中存在着访问策略所包含的属性会泄露用户的敏感信息以及恶意用户泄露私钥获取非法利益而不会被追责的问题。同时私钥长度、密文长度和解密运算量均会随属性数量增加而带来较大的通信开销和计算开销。针对以上问题提出了一种可追踪且隐藏访问结构的属性基加密方案。该方案在不影响加/解密效率的前提下提高了加密算法的安全性,并采用双因子身份认证机制实现了更安全高效的访问控制。并且引入一个安全的签名机制用于支持可追踪密钥来追踪恶意用户。该方案基于DBDH假设,在标准模型下被证明是安全的。 In the traditional attribute-based encryption scheme,there are problems that the attributes contained in the access policy may leak sensitive information of the user and the malicious user leaks the private key to gain illegal profits without being blamed.At the same time,with the increasing of the number of attributes the length of the private key,ciphertext,and the decryption operation will increase and it bring greater communication overhead and computational overhead.To solve these problems,this paper proposed an attribute-based encryption scheme that can track keys and hide the access structure.The scheme improved the security of the encryption algorithm without affecting the efficiency of encryption and decryption.The scheme adopted a two-factor authentication mechanism to achieve more secure and efficient access control,and it used a secure signature mechanism for supporting traceable keys to track malicious users.Finally,the theoretical analysis show that this scheme proved to be safe under the standard model based on the DBDH hypothesis.
作者 欧毓毅 刘春龙 Ou Yuyi;Liu Chunlong(School of Computers,Guangdong University of Technology,Guangzhou 510006,China)
出处 《计算机应用研究》 CSCD 北大核心 2019年第11期3382-3386,共5页 Application Research of Computers
基金 广东省教育部产学研合作资助项目(2014B090901053)
关键词 基于属性加密 可追踪 隐藏策略 双因子身份验证 attribute-based encryption traceability hidden policies two-factor authentication
  • 相关文献

参考文献7

二级参考文献44

  • 1YU S, WANG C, REN K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[A]. INFOCOM, 2010 Proceedings IEEE[C]. 2010. 1-9.
  • 2SAHAI A, WATERS B. Fuzzy Identity-Based Encryption[M]. Springer Berlin Heidelberg, 2005.
  • 3GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for free-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Secu- rity[C]. ACM, 2006.89-98.
  • 4BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attrib- ute-based encryption[A]. Security and Privacy[C]. 2007.321-334.
  • 5WATERS B. Ciphertext-Policy Attribute-Based Encryption: An Ex- pressive, Efficient, and Provably Secure Realization[M]. Springer Ber- lin Heidelberg, 2011.
  • 6CHASE M. Multi-Authority Attribute based Encryption[M]. Theory of Cryptography. Springer Berlin Heidelberg, 2007.
  • 7LEWKO A, WATERS B. Decentralizing Attribute-based Encryp- tion[M]. Springer Berlin Heidelberg, 2011.
  • 8LIU Z, CAO Z, HUANG Q, et al. Fully secure multi-authority cipher- text-policy attribute-based encryption without random oracles[A]. Computer Security-ESORICS 2011[C]. Springer Berlin Heidelberg, 20 l 1. 278-297.
  • 9SAHAI A, SEYALIOGLU H, WATERS B. Dynamic credentials and ciphertext delegation for attribute-based encryption[A]. Advances in Cryptology2RYPTO 2012[C]. Springer Berlin Heidelberg, 2012. 199-217.
  • 10YANG K, JIA X, PEN K, et al. Enabling efficient access control with dynamic policy updating for big dam in the cloudA. 1NFOCOM, 2014 Proceedings IEEE[C]. 2014. 2013-2021.

共引文献59

同被引文献30

引证文献4

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部