浏览全部资源
扫码关注微信
1. 西安电子科技大学通信工程学院,陕西 西安 710071
2. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
3. 西安电子科技大学计算机学院,陕西 西安 710071
[ "张凯(1987-),男,陕西西安人,西安电子科技大学博士生,主要研究方向为密码学、信息安全等。" ]
[ "马建峰(1963-),男,陕西西安人,西安电子科技大学教授、博士生导师,主要研究方向为计算机系统安全、移动与无线安全、系统可生存性和可信计算。" ]
[ "李辉(1983-),男,湖北武汉人,博士,西安电子科技大学副教授,主要研究方向为数据挖据、安全的数据查询和检索等。" ]
[ "张俊伟(1982-),男,陕西西安人,博士,西安电子科技大学副教授,主要研究方向为密码学、信息安全等。" ]
[ "张涛(1986-),男,陕西西安人,博士,西安电子科技大学讲师,主要研究方向为可信计算、社交网络等。" ]
网络出版日期:2017-03,
纸质出版日期:2017-03-15
移动端阅览
张凯, 马建峰, 李辉, 等. 支持高效撤销的多机构属性加密方案[J]. 通信学报, 2017,38(3):83-91.
Kai ZHANG, Jian-feng MA, Hui LI, et al. Multi-authority attribute-based encryption with efficient revocation[J]. Journal on communications, 2017, 38(3): 83-91.
张凯, 马建峰, 李辉, 等. 支持高效撤销的多机构属性加密方案[J]. 通信学报, 2017,38(3):83-91. DOI: 10.11959/j.issn.1000-436x.2017068.
Kai ZHANG, Jian-feng MA, Hui LI, et al. Multi-authority attribute-based encryption with efficient revocation[J]. Journal on communications, 2017, 38(3): 83-91. DOI: 10.11959/j.issn.1000-436x.2017068.
多机构属性加密方案非常适用于云存储环境下的数据访问控制。然而,高效的用户撤销仍是其中一个具有挑战的问题,这妨碍了多机构属性加密的实际应用。针对此问题,在素数阶群中提出一种支持高效撤销的多机构密文策略属性加密方案,并在随机预言模型下证明了方案是静态性安全和支持撤销的。分析结果表明所提方案极大地降低了用户的计算开销。此外,所提方案支持大属性域和所有单调访问结构,因此,在实际应用中更加灵活。
Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However
efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from practical applications.A multi-authority ciphertext-policy attribute-based encryption scheme with efficient revocation was proposed in prime order bilinear groups
and was further proved statically secure and revocable in the random oracle model.Extensive efficiency analysis results indicate that the proposed scheme significantly reduce the computation cost for the users.In addition
the proposed scheme supports large universe and any monotone access structures
which makes it more flexible for practical applications.
SAHAI A , WATERS B . Fuzzy identity-based encryption [C ] // EUROCRYPT . Aarhus,Denmark , 2005 : 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The 13th ACM Conference on Computer and Communications Security . Alexandria,VA,USA , 2006 : 89 - 98 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // The IEEE Symposium on Security and Privacy . Berkeley,CA,USA , 2007 : 321 - 334 .
CHASE M , . Multi-authority attribute based encryption [C ] // TCC . Amsterdam,The Netherlands , 2007 : 515 - 534 .
YANG K , JIA X . Expressive,efficient and revocable data access control for multi-authority cloud storage [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 7 ): 1735 - 1744 .
HUANG X , TAO Q , QIN B , et al . Multi-authority attribute based encryption scheme with revocation [C ] // The 24th International Conference on Computer Communication and Networks . IEEE , 2015 : 1 - 5 .
CUI H , DENG R H . Revocable and decentralized attribute-based encryption [J ] . The Computer Journal , 2016 :bxw007.
WATERS B , . Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization [C ] // PKC . Taormina,Italy , 2011 : 53 - 70 .
LEWKO A , WATERS B . Unbounded HIBE and attribute-based encryption [C ] // EUROCRYPT . Springer Berlin Heidelberg , 2011 : 547 - 567 .
ROUSELAKIS Y , WATERS B . Efficient statically-secure largeuniverse multi-authority attribute-based encryption [C ] // Financial Cryptography and Data Security . Berlin:Springer , 2015 : 315 - 332 .
ZHANG K , MA J , LIU J , et al . Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption [J ] .,2016,59(9):99105. Science China Information Sciences , 2016 , 59 ( 9 ):99105.
ATTRAPADUNG N , IMAI H . Attribute-based encryption supporting direct/indirect revocation modes [C ] // IMA International Conference on Cryptography and Coding.Springer Berlin Heidelberg . 2009 : 278 - 300 .
SAHAI A , SEYALIOGLU H , WATERS B . Dynamic credentials and ciphertext delegation for attribute-based encryption [C ] // Crypto . Springer Berlin Heidelberg , 2012 : 199 - 217 .
YANG Y , DING X , LU H , et al . Achieving revocable fine-grained cryptographic access control over cloud data [C ] // Information Security . Springer International Publishing , 2015 : 293 - 308 .
YANG Y , LIU J K , LIANG K , et al . Extended proxy-assisted approach:achieving revocable fine-grained encryption of cloud data [C ] // European Symposium on Research in Computer Security . Springer International Publishing , 2015 : 146 - 166 .
闫玺玺 , 孟慧 . 支持直接撤销的密文策略属性基加密方案 [J ] . 通信学报 , 2016 , 37 ( 5 ): 44 - 50 .
YAN X X , MENG H . Ciphertext policy attribute-based encryption scheme supporting direct revocation [J ] . Journal on Communications , 2016 , 37 ( 5 ): 44 - 50 .
BEIMEL A . Secure schemes for secret sharing and key distribution [D ] . Technical-Israel Institute of Technology,Faculty of Computer Science , 1996 .
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts [C ] // The 20th USENIX Security Symposium . San Francisco , 2011 : 523 - 538 .
0
浏览量
1174
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构