浏览全部资源
扫码关注微信
河南理工大学计算机科学与技术学院,河南 焦作 454003
[ "闫玺玺(1985- ),女,河南灵宝人,博士,河南理工大学副教授,主要研究方向为网络与信息安全、数字版权管理、数字内容安全" ]
[ "何旭(1993- ),男,河北冀州人,河南理工大学硕士生,主要研究方向为网络与信息安全、密码学" ]
[ "刘涛(1994- ),男,河南商丘人,河南理工大学硕士生,主要研究方向为网络与信息安全、软件定义网络" ]
[ "叶青(1981- ),女,辽宁营口人,博士,河南理工大学讲师,主要研究方向为信息安全、格密码学、数字签名" ]
[ "于金霞(1974- ),女,河南博爱人,博士,河南理工大学教授,主要研究方向为网络与信息安全、人工智能、智能信息处理" ]
[ "汤永利(1972- ),男,河南孟州人,博士,河南理工大学教授,主要研究方向为网络与信息安全、密码学" ]
网络出版日期:2020-04,
纸质出版日期:2020-04-25
移动端阅览
闫玺玺, 何旭, 刘涛, 等. 抗密钥委托滥用的可追踪属性基加密方案[J]. 通信学报, 2020,41(4):150-161.
Xixi YAN, Xu HE, Tao LIU, et al. Traceable attribute-based encryption scheme with key-delegation abuse resistance[J]. Journal on communications, 2020, 41(4): 150-161.
闫玺玺, 何旭, 刘涛, 等. 抗密钥委托滥用的可追踪属性基加密方案[J]. 通信学报, 2020,41(4):150-161. DOI: 10.11959/j.issn.1000-436x.2020016.
Xixi YAN, Xu HE, Tao LIU, et al. Traceable attribute-based encryption scheme with key-delegation abuse resistance[J]. Journal on communications, 2020, 41(4): 150-161. DOI: 10.11959/j.issn.1000-436x.2020016.
针对可追踪属性基加密方案利用追踪功能解决密钥委托滥用问题的不完备性,提出了一种抗密钥委托滥用的可追踪属性基加密方案。将秘密参数分享给用户私钥中关联属性的全部组件,使解密过程必须由全部组件共同参与完成,仅由用户私钥的一部分不能进行解密操作,从而实现真正的抗密钥委托滥用。利用一种短签名技术保护用户私钥中的追踪参数,防止追踪参数被伪造,从而获得对用户的追踪能力。同时支持抗密钥委托滥用和可追踪增强了所提方案的安全性。与相关方案的对比分析表明,所提方案在参数尺寸和计算代价上具有更好的性能优势。
Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely
a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes
and the decryption was completed by using all these components together
such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged
so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes
the proposed scheme has better advantage in terms of the parameters size and the computation cost.
SAHAI A , WATERS B . Fuzzy identity-based encryption [C ] // The 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques . Berlin:Springer , 2005 : 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The 13th ACM Conference on Computer and Communications Security . New York:ACM Press , 2006 : 89 - 98 .
齐芳 , 李艳梅 , 汤哲 . 可撤销和可追踪的密钥策略属性基加密方案 [J ] . 通信学报 , 2018 , 39 ( 11 ): 63 - 69 .
QI F , LI Y M , TANG Z . Revocable and traceable key-policy attribute-based encryption scheme [J ] . Journal on Communications , 2018 , 39 ( 11 ): 63 - 69 .
李学俊 , 张丹 , 李晖 . 可高效撤销的属性基加密方案 [J ] . 通信学报 , 2019 , 40 ( 6 ): 32 - 39 .
LI X J , ZHANG D , LI H . Efficient revocable attribute-based encryption scheme [J ] . Journal on Communications , 2019 , 40 ( 6 ): 32 - 39 .
于金霞 , 何旭 , 闫玺玺 . 机构可验证的密文策略属性基加密方案 [J ] . 西安电子科技大学学报 , 2019 , 46 ( 4 ): 49 - 57 .
YU J X , HE X , YAN X X . Ciphertext-policy attribute-based encryption scheme with verifiability on authority [J ] . Journal of Xidian University , 2019 , 46 ( 4 ): 49 - 57 .
JIANG Y , SUSILO W , MU Y , et al . Ciphertext-policy attribute-based encryption with key-delegation abuse resistance [C ] // The 21st Australasian Conference on Information Security and Privacy . Berlin:Springer , 2016 : 477 - 494 .
JIANG Y , SUSILO W , MU Y , et al . Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing [J ] . Future Generation Computer Systems , 2018 , 78 ( 2 ): 720 - 729 .
LIU Z , CAO Z , WONG D S . White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 1 ): 76 - 88 .
ROUSELAKIS Y , WATERS B . Practical constructions and new proof methods for large universe attribute-based encryption [C ] // The 2013 ACM SIGSAC Conference on Computer and Communications Security . New York:ACM Press , 2013 : 463 - 474 .
BONEH D , BOYEN X . Short signatures without random oracles [C ] // The International Conference on the Theory and Applications of Cryptographic Techniques . Berlin:Springer , 2004 : 56 - 73 .
NING J , CAO Z , DONG X , et al . Large universe ciphertext-policy attribute-based encryption with white-box traceability [C ] // The 19th European Symposium on Research in Computer Security . Berlin:Springer , 2014 : 55 - 72 .
YU S , REN K , LOU W , et al . Defending against key abuse attacks in KP-ABE enabled broadcast systems [C ] // The 5th International Conference on Security and Privacy in Communication Networks . Berlin:Springer , 2009 : 311 - 329 .
张星 , 文子龙 , 沈晴霓 , 等 . 可追责并解决密钥托管问题的属性基加密方案 [J ] . 计算机研究与发展 , 2015 , 52 ( 10 ): 2293 - 2303 .
ZHANG X , WEN Z L , SHEN Q N , et al . Accountable attribute-based encryption scheme without key escrow [J ] . Journal of Computer Research and Development , 2015 , 52 ( 10 ): 2293 - 2303 .
NING J , DONG X , CAO Z , et al . Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud [C ] // The 20th European Symposium on Research in Computer Security . Berlin:Springer , 2015 : 270 - 289 .
YU G , MA X , CAO Z , et al . Accountable multi-authority ciphertext-policy attribute-based encryption without key escrow and key abuse [C ] // The 9th International Symposium on Cyberspace Safety and Security . Berlin:Springer , 2017 : 337 - 351 .
ZHANG Y , LI J , ZHENG D , et al . Towards privacy protection and malicious behavior traceability in smart health [J ] . Personal and Ubiquitous Computing , 2017 , 21 ( 5 ): 815 - 830 .
LAI J , TANG Q . Making any attribute-based encryption accountable,efficiently [C ] // The 23rd European Symposium on Research in Computer Security . Berlin:Springer , 2018 : 527 - 547 .
LI Q , ZHU H , YING Z , et al . Traceable ciphertext-policy attributebased encryption with verifiable outsourced decryption in eHealth cloud [J ] . Wireless Communications and Mobile Computing , 2018 ( 1 ):1701675.
QIAO H , REN J , WANG Z , et al . Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing [J ] . Future Generation Computer Systems , 2018 , 88 ( 1 ): 107 - 116 .
CARO A D , IOVINO V . jPBC:Java pairing based cryptography [C ] // The 16th IEEE Symposium on Computers and Communications . Piscataway:IEEE Press , 2011 : 850 - 855 .
0
浏览量
966
下载量
2
CSCD
关联资源
相关文章
相关作者
相关机构