浏览全部资源
扫码关注微信
河南理工大学 计算机科学与技术学院,河南 焦作 454003
[ "闫玺玺(1985-),女,河南灵宝人,河南理工大学讲师,主要研究方向为数字版权管理、数字内容安全、计算机网络安全。" ]
[ "汤永利(1972-),男,河南孟州人,博士,河南理工大学副教授,主要研究方向为计算机网络安全、数字内容安全、信息安全测评。" ]
网络出版日期:2015-10,
纸质出版日期:2015-10-25
移动端阅览
闫玺玺, 汤永利. 数据外包环境下一种支持撤销的属性基加密方案[J]. 通信学报, 2015,36(10):92-100.
Xi-xi YAN, Yong-li TANG. Attribute-based encryption scheme with efficient revocation in data outsourcing systems[J]. Journal on communications, 2015, 36(10): 92-100.
闫玺玺, 汤永利. 数据外包环境下一种支持撤销的属性基加密方案[J]. 通信学报, 2015,36(10):92-100. DOI: 10.11959/j.issn.1000-436x.2015254.
Xi-xi YAN, Yong-li TANG. Attribute-based encryption scheme with efficient revocation in data outsourcing systems[J]. Journal on communications, 2015, 36(10): 92-100. DOI: 10.11959/j.issn.1000-436x.2015254.
针对数据外包环境中属性的细粒度撤销,借助于数据外包管理服务器和密钥加密密钥,提出一种间接模式下支持即时撤销的属性基加密方案。首先给出外包环境中支持撤销的属性基加密定义和安全模型,其次给出具体的支持撤销的密文策略——属性基加密方案并对安全性进行证明,最后,与其他方案进行对比,该方案在密文和密钥长度方面都有所减少。另外,方案实现对用户部分属性进行细粒度撤销,支持属性的即时撤销,即使用户错过密钥即时更新的信息,也只需在解密密文前更新自己的密钥,更加贴近于实际环境。
In order to support fine-grained attribute revocation in data outsourcing systems
an attribute-based encryption scheme with efficient revocation in indirect revocation model was proposed.The model of ABE supporting attribute revocation was given
and a concrete scheme was constructed which proved its security under the standard model.Compared to the existing related schemes
the size of ciphertext and private/secret key is reduced
and the new scheme achieves fine-grained and immediate attribute revocation which is more suitable for the practical applications.
SAHAI A , WATERS B . Fuzzy identity-based encryption [A ] . Advances in Cryptology - EUROCRYPT 2005 [C ] . Berlin,Heidelberg,Springer Verlag , 2005 . 457 - 473 .
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures [A ] . Proc of the ACM Conf on Computer and Communications Security [C ] . New York , 2007 . 195 - 203 .
ATTAPADUNG N , IMAI H . Conjunctive broadcast and attribute-based encryption [A ] . Proc of the Pairing-Based CryptographyPairing 2009 [C ] . Berlin,Heidelberg : Springer-Verlag , 2009 . 248 - 265 .
王鹏翩 , 冯登国 , 张立武 . 一种支持完全细粒度属性撤销的 CP-ABE方案 [J ] . 软件学报 , 2012 , 23 ( 10 ): 2805 - 2816 .
WANG P P , FENG D G , ZHANG L W . CP-ABE scheme supporting fully fine-grained attribute revocation [J ] . Journal of Software , 2012 , 23 ( 10 ): 2805 - 2816 .
WU Q X . A generic construction of ciphertext-policy attribute-based encryption supporting attribute revocation [J ] . In:China communications , 2014 , 11 ( 1 ): 93 - 100 .
PIRRETTI M , TRAYNOR P , MCDANIEL P , et al . Secure attribute-based systems [A ] . Proc of the ACM Conf.on Computer and Communications Security [C ] . New York , 2006 . 99 - 111 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [A ] . Proc of the 2007 IEEE Symp on Security and Privacy [C ] . Washington,IEEE Computer Society , 2007 . 322 - 334 .
BOLDYREVA A , GOYAL V , KUMAR V . Identity-based encryption with efficient revocation [A ] . Proc of the ACM Conf on Computer and Communications Security [C ] . New York , 2008 . 417 - 426 .
IBRAIMI L , PETKOVIC M , NIKOYA S , et al . Mediated ciphertext-policy attribute-based encryption and its application [A ] . Proc of the 10th Int’l Workshop on Information Security Applications-WISA 2009 [C ] . LNCS 5932,Berlin,Heidelberg : Springer-Verlag , 2009 . 310 - 322 .
YU S C , WANG C , REN K , et al . Attribute based data sharing with attribute revocation [A ] . Proc of the ASIAN ACM Conf on Computer and Communications Security(ASIACCS 2010) [C ] . New York,ACM Press , 2010 . 262 - 270 .
CHENG Y , WANG Z Y , MA J , et al . Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage [J ] . Journal of Zhejiang University-Science C , 2013 , 14 ( 2 ): 85 - 97 .
HUR J , NOH D K . Attribute-based access control with efficient revocation in data outsourcing systems [J ] . IEEE Transactions on Parallel and Distributed Systems , 2011 , 22 ( 7 ): 1214 - 1221 .
XIE X X , MA H , LI J , et al . An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing [J ] . Journal of Universal Computer Science , 2013 ,( 16 ): 2349 - 2367 .
TAKERU N , MASAMI M , YOSHIAKI S . Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating [J ] . Human-Centric Computing and Information Sciences , 2015 ,( 8 ): 1 - 13 .
IBRAIMI L , TANG Q , HARTEL P , et al . Efficient and provable secure ciphertext-policy attribute-based encryption schemes [A ] . Proc of the Information Security Practice and Experience [C ] . Berlin,Heidelberg : Springer-Verlag , 2009 . 1 - 12 .
0
浏览量
1062
下载量
9
CSCD
关联资源
相关文章
相关作者
相关机构