浏览全部资源
扫码关注微信
1. 北京交通大学 计算机与信息技术学院,北京100044
2. 信息保障技术重点实验室,北京100072
[ "宋衍(1982-),男,湖北老河口人,北京交通大学博士生,信息保障技术重点实验室工程师,主要研究方向为网络安全、数据库等。" ]
[ "韩臻(1962-),男,浙江宁波人,北京交通大学教授、博士生导师,主要研究方向为信息安全体系结构、可信计算等。" ]
[ "刘凤梅(1974-),女,河南郸城人,博士,信息保障技术重点实验室副研究员,主要研究方向为密码理论与应用。" ]
[ "刘磊(1979-),男,陕西户县人,信息保障技术重点实验室工程师,主要研究方向为信息安全、操作系统等。" ]
网络出版日期:2015-09,
纸质出版日期:2015-09-25
移动端阅览
宋衍, 韩臻, 刘凤梅, 等. 基于访问树的策略隐藏属性加密方案[J]. 通信学报, 2015,36(9):119-126.
Yan SONG, Zhen HAN, Feng-mei LIU, et al. Attribute-based encryption with hidden policies in the access tree[J]. Journal on communications, 2015, 36(9): 119-126.
宋衍, 韩臻, 刘凤梅, 等. 基于访问树的策略隐藏属性加密方案[J]. 通信学报, 2015,36(9):119-126. DOI: 10.11959/j.issn.1000-436x.2015135.
Yan SONG, Zhen HAN, Feng-mei LIU, et al. Attribute-based encryption with hidden policies in the access tree[J]. Journal on communications, 2015, 36(9): 119-126. DOI: 10.11959/j.issn.1000-436x.2015135.
已有的策略隐藏属性加密(ABE
attribute-based encryption)方案只支持受限的访问结构,策略表达能力弱,基于此提出一种新的访问树结构,使属性隐藏和秘密共享能够应用到“与”门、“或”门和“门限”门中。并且,利用合数阶双线性群构造了一种基于访问树的策略隐藏方案,并通过双系统加密的概念证明了方案的安全性。分析和实验验证表明,方案在实现复杂访问结构的策略隐藏的同时,并没有过多地增加计算开销,在实际应用过程中更加灵活和有效。
The existing policies-hidden attribute-based encryption (ABE) schemes could only support a limited access structure
which resulted in weak expressiveness.A new structure of access tree was thus proposed to integrate attribute hiding and secret sharing into “and” gate
“or” gate and “threshold” gate.Then
a tree-based policies-hidden scheme was constructed by using composite order bilinear groups.Under dual system encryption
the scheme was proved to be secure.Furthermore
the analysis and experiment demonstrate that the scheme realize policies-hidden in the complex ac-cess structure without increasing the overhead of computation.As a result
it is more feasible and flexible for applica-tions.
苏金树 , 曹丹 , 王小峰 , 等 . 属性基加密机制 [J ] . 软件学报 , 2011 , 22 ( 6 ): 1299 - 1315 .
SU J S , CAO D , WANG X F , et al . Attribute-based encryption schemes [J ] . Journal of Software , 2011 , 22 ( 6 ): 1299 - 1315 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [A ] . Ad-vances in the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT 2005) [C ] . Aarhus,Denmark , 2005 . 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [A ] . Proceedings of the 13th ACM Conference on Computer and Communications Security [C ] . Alexandria,VA,USA , 2006 . 89 - 98 .
BETHENCOUNT J , SAHAI A , WATERS B . Ciphertext-policy attrib-ute-based encryption [A ] . Proceedings of the 2007 IEEE Symposium on Security and Privacy(IEEE S&P 2007) [C ] . Oakland,CA,USA , 2007 . 321 - 334 .
KAPADIA A , TSANG PP , SMITH S W . Attribute-based publishing with hidden credential and hidden policies [A ] . Proceedings of the 14th Annual Network and Distributed System Security Symposim(NDSS 2007) [C ] . San Diego,CA,USA , 2007 . 179 - 192 .
NISHIDE T , YONEYAMA K , OHTA K . Attribute-based encryption with partially hidden encryptor-specified access structures [A ] . Pro-ceedings of the Applied Cryptography and Network Security (ACNS 2008) [C ] . New York,NY,USA , 2008 . 111 - 129 .
LAI J Z , DENG R H , LI Y J . Fully secure cipertext-policy hiding CP-ABE [A ] . Proceedings of the 7th Information Security Practice and Experience(ISPEC 2011) [C ] . Guangzhou,China , 2011 . 24 - 39 .
王海斌 , 陈少真 . 隐藏访问结构的基于属性加密方案 [J ] . 电子与信息学报 , 2012 , 34 ( 2 ): 457 - 561 .
WANG H B , CHEN S Z . Attribute-based encryption with hidden ac-cess structures [J ] . Journal of Electronics and Information Technology , 2012 , 34 ( 2 ): 457 - 561 .
FREEMAN M . Converting pairing-based cryptosystems from com-posite-order groups to prime-order groups [A ] . Advances in Advances in the 29th Annual International Conference on the Theory and Appli-cations of Cryptographic Techniques(EUROCRYPT 2010) [C ] . Aarhus,Denmark , 2010 . 44 - 61 .
IBRAIMI L , TANG Q , HARTEL P , et al . Efficient and provable se-cure ciphertext-policy attribute-based encryption schemes [A ] . Pro-ceedings of the Information Security Practice and Experience [C ] . Xi'an,China , 2009 . 1 - 12 .
BONEH D , GOH E , NISSIM K . Evaluating 2-dnf formulas on cipher-texts [A ] . Proceedings of the 1st Theory of Cryptography Confer-ence(TCC 2005) [C ] . Cambridge,MA,USA , 2005 . 325 - 341 .
WATERS B . Dual system encryption:realizing fully secure ibe and hibe under simple assumptions [A ] . Advances in the 29th International CryptologyConference(CRYPTO 2009) [C ] . Santa Barbara,CA,USA , 2009 . 619 - 636 .
LYNN B . The pairing-based cryptography(PBC) library [EB/OL ] . http://crypto.Stanford.edu/pbc/ http://crypto.Stanford.edu/pbc/ .
BETHENCOURT J , SAHAI A , WATERS B . Advanced crypto soft-ware collection:the cpabetoolkit [EB/OL ] . http://acsc.cs.utexas.edu/cpabe/ http://acsc.cs.utexas.edu/cpabe/ . 2011 .
0
浏览量
1547
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构