浏览全部资源
扫码关注微信
1. 南通大学计算机科学与技术学院,江苏 南通 226019
2. 同济大学计算机科学与技术系,上海 201804
3. 南通大学理学院,江苏 南通 226007
[ "马海英(1977-),女,河南卫辉人,博士,南通大学副教授,主要研究方向为公钥密码学和网络安全。" ]
[ "曾国荪(1964-),男,江西吉安人,同济大学教授、博士生导师,主要研究方向为网格计算、可信软件。" ]
[ "陈建平(1960-),男,江苏南通人,南通大学教授、硕士生导师,主要研究方向为信息安全、数值计算等。" ]
[ "王金华(1963-),男,江苏南通人,博士,南通大学教授、博士生导师,主要研究方向为信息安全、组合数学等。" ]
[ "王占君(1978-),男,河南鹤壁人,南通大学讲师,主要研究方向为公钥密码学和Hopf代数。" ]
网络出版日期:2016-01,
纸质出版日期:2016-01-25
移动端阅览
马海英, 曾国荪, 陈建平, 等. 适应性安全的可追踪叛徒的基于属性加密方案[J]. 通信学报, 2016,37(1):76-87.
ying MAHai, sun ZENGGuo, ping CHENJian, et al. Adaptively secure attribute-based encryption for traitor tracing[J]. Journal on communications, 2016, 37(1): 76-87.
马海英, 曾国荪, 陈建平, 等. 适应性安全的可追踪叛徒的基于属性加密方案[J]. 通信学报, 2016,37(1):76-87. DOI: 10.11959/j.issn.1000-436x.2016009.
ying MAHai, sun ZENGGuo, ping CHENJian, et al. Adaptively secure attribute-based encryption for traitor tracing[J]. Journal on communications, 2016, 37(1): 76-87. DOI: 10.11959/j.issn.1000-436x.2016009.
针对基于属性加密(ABE
attribute-base encryption)机制存在的密钥滥用问题,为每个用户增加唯一的身份标识符,将联合安全编码和叛徒追踪机制引入到ABE方案中,给出适应性安全的可追踪叛徒ABE的定义、安全模型和可追踪模型,提出一种适应性安全的可追踪叛徒的ABTT方案,该方案允许适应性追踪指定策略盗版解码器中的叛徒。基于合数阶群上的子群判定假设和 DDH 假设,证明所提方案是适应性安全和适应性可追踪的。因此,所提方案不仅可以适应性追查指定策略盗版解码器中的叛徒,而且进一步增强了 ABE 系统的安全性,具有一定的理论和应用价值。
For the key abuse problem in attribute-based encryption (ABE)
each user was identified by his unique identity
and the collusion secure codes and the traitor tracing mechanism were introduced to the ABE scheme. The definition
security model and tracing model for adaptively secure attribute-based encryption for traitor tracing (ABTT)were forma-lized
and an adaptively secure ABTT scheme was proposed
which may trace traitors in policy-specific pirate decorders. Under these subgroup decision assumptions in composite groups and the DDH assumption
adaptively secure and can adaptively trace traitors were proved. Therefore
the scheme not only was capable of tracing adaptively traitors in policy-specific pirate decorders
but also further strengthens the security of ABE system
which has theoretical and prac-tical values.
SAHAI A , WATERS B . Fuzzy identity based encryption [C ] // The EUROCRYPT . Aarhus,Denmark , c 2005 : 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The 13th ACM Conference on Computer and Communication Security . Alexandria,Virginia,USA , c 2006 : 89 - 98 .
HINEK M J , JIANG S , SAFAVI-NAINI R , et al . Attribute-based encryption with key cloning protection [EB/OL ] . http://eprint.iacr.org/2008/478.pdf http://eprint.iacr.org/2008/478.pdf .
马海英 , 曾国荪 . 可追踪并撤销叛徒的属性基加密方案 [J ] . 计算机学报 , 2012 , 35 ( 9 ): 1845 - 1855 .
MA H Y , ZENG G S . An attribute-based encryption scheme for traitor tracing and revocation together [J ] . Chinese Journal of Computers , 2012 , 35 ( 9 ): 1845 - 1855 .
WANG Y T , CHEN K F , CHEN J H . Attribute-based traitor tracing [J ] . Journal of Information Science and Engineering , 2011 , 27 ( 1 ): 181 - 195 .
LI J , REN K , KIM K . A 2 BE: accountable attribute-based encryption for abuse free access control [EB/OL ] . http://eprint.iacr.org/2009/118.pdf http://eprint.iacr.org/2009/118.pdf .
YU S C , REN K , LOU W J , et al . Defending against key abuse attacks in KP-ABE enabled broadcast system [C ] // The Security and Privacy in Communication Networks . Athens,Greece , c 2009 : 311 - 329 .
BONEH D , SHAW J . Collusion-secure fingerprinting for digital da-ta [C ] // The CRYPTO'95. Santa Barbara , California, USA , c 1995 : 452 - 465 .
ABDALLA M , DENT A W , MALONE-LEE J , et al . Identity-based traitor tracing [C ] // The public Key Cryptography . Beijing, China , c 2007 : 298 - 314 .
LIU Z , CAO Z , WONG D S . Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption ices on eBay [C ] // The 20th Conference on Computer and Communication Se-curity . Berlin,Germany , c 2013 : 475 - 486 .
LEWKO A , OKAMOTO T , SAHAI A , et al . Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption [C ] // The EUROCRYPT . c 2010 : 62 - 91 .
WATERS B . Dual system encryption: realizing fully secure ibe and hibe under simple assumptions [C ] // The CRYPTO'09 . Santa Barbara, California,USA , c 2009 : 619 - 636 .
GREEN M , AKINYELE A , RUSHANAN M . Libfenc: The Functional Encryption Library [EB/OL ] . http://code.google.com/p/libfenc http://code.google.com/p/libfenc .
0
浏览量
841
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构