浏览全部资源
扫码关注微信
河南理工大学计算机科学与技术学院,河南 焦作454003
[ "闫玺玺(1985-),女,河南灵宝人,博士,河南理工大学讲师,主要研究方向为数字版权管理、数字内容安全、计算机网络安全。" ]
[ "孟慧(1981-),女,河南孟县人,博士,河南理工大学讲师,主要研究方向为数字签名、数字内容安全、计算机网络安全。" ]
网络出版日期:2016-05,
纸质出版日期:2016-05-15
移动端阅览
闫玺玺, 孟慧. 支持直接撤销的密文策略属性基加密方案[J]. 通信学报, 2016,37(5):44-50.
Xi-xi YAN, Hui MENG. Ciphertext policy attribute-based encryption scheme supporting direct revocation[J]. Journal on communications, 2016, 37(5): 44-50.
闫玺玺, 孟慧. 支持直接撤销的密文策略属性基加密方案[J]. 通信学报, 2016,37(5):44-50. DOI: 10.11959/j.issn.1000-436x.2016091.
Xi-xi YAN, Hui MENG. Ciphertext policy attribute-based encryption scheme supporting direct revocation[J]. Journal on communications, 2016, 37(5): 44-50. DOI: 10.11959/j.issn.1000-436x.2016091.
提出一种支持直接撤销的属性基加密方案,首先给出支持直接撤销的属性基加密定义和安全模型,其次给出具体的支持撤销的密文策略——属性基加密方案并对安全性进行证明,最后,与其他方案对比显示,该方案在密文和密钥长度方面都有所减少。该方案可以实现对用户进行即时撤销,当且仅当用户所拥有的属性满足密文的访问结构且不在用户撤销列表内时,才能使用自己的私钥解密出明文。
In order to support fine-grained attribute revocation in direct revocation mode an attribute-based encryption scheme with efficient revocation was proposed.The model of ABE supporting attribute revocation was given
and a con-crete scheme was constructed which was proven its security under the standard model.Compared to the existing related schemes
the size of ciphertext and private/secret key was reduced.In additional
the new scheme achieved fine-grained and immediate attribute revocation which is more suitable for the practical applications.
SAHAI A , WATERS B . Fuzzy identity-based encryption [C ] // Ad-vances in Cryptology -EUROCRYPT 2005 . Berlin c2005 : 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The 13th ACM Conference on Computer and Communications Security . New York , c2006 : 89 - 98 .
PIRRETTI M , TRAYNOR P , MCDANIEL P , et al . Secure attribute-based systems [C ] // The ACM Conf on Computer and Com-munications Security . New York , c2006 : 99 - 111 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // The 2007 IEEE Symp on Security and Privacy . Washington c2007 : 322 - 334 .
BOLDYREVA A , GOYAL V , KUMAR V . Identity-based encryption with efficient revocation [C ] // The ACM Conf on Computer and Com-munications Security . New York , c2008 : 417 - 426 .
IBRAIMI L , PETKOVIC M , NIKOYA S , et al . Mediated cipher-text-policy attribute-based encryption and its application [C ] // The 10th Int'l Workshop on Information Security Applications-WISA . Berlin , c2009 : 310 - 322 .
YU S C , WANG C , REN K , et al . Attribute based data sharing with attribute revocation [C ] // The ASIAN ACM Conf on Computer and Com-munications Security(ASIACCS 2010) . New York , c2010 : 262 - 270 .
CHENG Y , WANG Z Y , MA J , et al . Efficient revocation i cipher-text-policy attribute-based encryption based cryptographic cloud sto-rage [J ] . Journal of Zhejiang University-Science , 2013 , 14 ( 2 ): 85 - 97 .
HUR J , NOH D K . Attribute-based access control with efficient revo-cation in data outsourcing systems [J ] . IEEE Transactions on Parallel and Distributed Systems , 2011 , 122 ( 7 ): 1214 - 1221 .
XIE X X , MA H , LI J , et al . An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing [J ] . Journal of Universal Computer Science , 2013 , 119 ( 16 ): 2349 - 2367 .
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures [C ] // The ACM Conf on Com-puter and Communications Security . New York , c2007 : 195 - 203 .
ATTAPADUNG N , IMAI H . Conjunctive broadcast and attribute-based encryption [C ] // The Pairing-Based Cryptography-Pairing 2009 . Berlin c20079 : 248 - 265 .
王鹏翩 , 冯登国 , 张立武 . 一种支持完全细粒度属性撤销的CP-ABE方案软件学报 [J ] . 软件学报 , 2012 , 23 ( 10 ): 2805 - 2816 .
WANG P P , FENG D G , ZHANG L W . CP-ABE scheme supporting fully fine-grained attribute revocation [J ] . Journal of Software , 2012 , 23 ( 10 ): 2805 - 2816 .
WU Q X . A generic construction of ciphertext-policy attribute-based encryption supporting attribute revocation [J ] . China Communica-tions , 2014 , 111 ( 1 ): 93 - 100 .
LIU Z , CAO Z F . On efficiently transferring the linear secret-sharing schemes matrix in ciphertext-policy attribute-based encryption [EB/OL ] . http://eprint.iacr.org/2010/374.pdf http://eprint.iacr.org/2010/374.pdf , 2010 .
LIU Z , CAO Z F . Efficient generation of linear secret haring scheme matrices from threshold access trees [C ] // Cryptology ePrint Archive:Listing . c2010 .
LEWKO A , SAHAI A , WATERS B . Revocation systems with very small private keys [C ] // IEEE Symposium on Security and Privacy(SP) . Oakland,USA , c2010 : 273 - 285 .
IBRAIMI L , TANG Q , HARTEL P , et al . Efficient and provable secure ciphertext-policy attribute-based encryption schemes [C ] // The Infor-mation Security Practice and Experience . Berlin , c2009 : 1 - 12 .
0
浏览量
1094
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构