浏览全部资源
扫码关注微信
1. 西安电子科技大学 计算机学院,陕西 西安 710071
2. 西安电子科技大学 陕西省网络与系统安全重点实验室,陕西 西安 710071
3. 通信信息控制和安全技术重点实验室,浙江 嘉兴,314033
4. 福建师范大学 软件学院,福建 福州 350108
5. 西安电子科技大学 通信工程学院,陕西 西安 710071
[ "李琦(1989-),男,江苏淮安人,西安电子科技大学博士生,主要研究方向为信息安全与基于属性的密码学。" ]
[ "马建峰(1963-),男,陕西西安人,博士,西安电子科技大学教授、博士生导师,主要研究方向为密码学、计算机网络与信息安全。" ]
[ "熊金波(1981-),男,湖南益阳人,福建师范大学讲师,主要研究方向为访问控制技术与结构化文档安全。" ]
[ "刘西蒙(1988-),男,陕西西安人,西安电子科技大学博士生,主要研究方向为公钥密码学与信息安全、安全网络编码及其应用。" ]
网络出版日期:2014-11,
纸质出版日期:2014-11-30
移动端阅览
李琦, 马建峰, 熊金波, 等. 快速解密的自适应安全KP-ABE方案[J]. 通信学报, 2014,35(Z2):26-32.
Qi LI, Jian-feng MA, Jin-bo XIONG, et al. Adaptively secure key-policy ABE scheme with fast decryption[J]. Journal on communications, 2014, 35(Z2): 26-32.
李琦, 马建峰, 熊金波, 等. 快速解密的自适应安全KP-ABE方案[J]. 通信学报, 2014,35(Z2):26-32. DOI: 10.3969/j.issn.1000-436x.2014.z2.005.
Qi LI, Jian-feng MA, Jin-bo XIONG, et al. Adaptively secure key-policy ABE scheme with fast decryption[J]. Journal on communications, 2014, 35(Z2): 26-32. DOI: 10.3969/j.issn.1000-436x.2014.z2.005.
已有的自适应安全 ABE(attribute-based encryption)方案的解密开销随着解密时用到的属性数量呈线性增长。针对该问题,提出了一种快速解密的自适应安全key-policy ABE(FKP-ABE)方案,在合数阶群上构造,支持任意可以表达为线性秘密分享体制(LSSS
linear secret sharing schemes)的单调访问策略,将解密开销降为常数级,并在标准模型下证明该方案是自适应安全的。
In the existing adaptively secure ABE (attribute-based encryption) schemes
the decryption cost goes linearly with the number of attributes that are used in decryption.An adaptively secure key-policy ABE (FKP-ABE) scheme with fast decryption is proposed
where constant size of computation overhead is implemented in decryption.This scheme is constructed on composite order bilinear groups and supports any monotonic access structure that can be expressed by LSSS (linear secret sharing schemes).The proposed scheme is proved to be adaptively secure in the standard model.
SAHAI A , WATERS B . Fuzzy identity-based encryption [A ] . Cryptology-EUROCRYPT 2005 [C ] . Springer Berlin Heidelberg , 2005 . 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [A ] . Proceedings of the 13th ACM Conference on Computer and Communications Security [C ] . 2006 . 89 - 98 .
OSTROVSKY R , SAHAI A , WATERS B . Attribute-based encryption with non-monotonic access structures [A ] . Proceedings of the 14th ACM Conference on Computer and Communications Security [C ] . 2007 . 195 - 203 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [A ] . IEEE Symposium on Security and Privacy,2007 [C ] . 2007 . 321 - 334 .
CHEUNG L , NEWPORT C . Provably secure ciphertext policy ABE [A ] . Proceedings of the 14th ACM Conference on Computer and Communications Security [C ] . 2007 . 456 - 465 .
GOYAL V , JAIN A , PANDEY O , et al . Bounded Ciphertext Policy Attribute Based Encryption [M ] . Automata,Languages and Programming,Springer Berlin Heidelberg , 2008 . 579 - 591 .
WATERS B . Ciphertext-policy Attribute-based Encryption:an Expressive,Efficient,and Provably Secure Realization [M ] . Public Key Cryptography-PKC 2011,Springer Berlin Heidelberg , 2011 . 53 - 70 .
ATTRAPADUNG N , LIBERT B , De PANAFIEU E . Expressive Key-Policy Attribute-based Encryption with Constant-size Ciphertexts [M ] . Public Key Cryptography–PKC 2011,Springer Berlin Heidelberg , 2011 . 90 - 108 .
ATTRAPADUNG N , HERRANZ J , LAGUILLAUMIE F , et al . Attribute-based encryption schemes with constant-size ciphertexts [J ] . Theoretical Computer Science , 2012 , 422 : 15 - 38 .
HOHENBERGER S , WATERS B . Attribute-Based Encryption with Fast Decryption [M ] . Public-Key Cryptography–PKC 2013,Springer Berlin Heidelberg , 2013 . 162 - 179 .
CANETTI R , HALEVI S , KATZ J . A forward-secure public-key encryption scheme [A ] . Cryptology—Eurocrypt 2003 [C ] . Springer Berlin Heidelberg , 2003 . 255 - 271 .
OKAMOTO T , TAKASHIMA K . Fully secure functional encryption with general relations from the decisional linear assumption [A ] . Cryptology–CRYPTO 2010 [C ] . Springer Berlin Heidelberg , 2010 . 191 - 208 .
LEWKO A , OKAMOTO T , SAHAI A , et al . Fully secure functional encryption:attribute-based encryption and (hierarchical) inner product encryption [A ] . Cryptology–EUROCRYPT 2010 [C ] . Springer Berlin Heidelberg , 2010 . 62 - 91 .
BONEH D , GOH E J , NISSIM K . Evaluating 2-DNF Formulas on Ciphertexts [M ] . Theory of Cryptography . Springer Berlin Heidelberg , 2005 . 325 - 341 .
BEIMEL A . Secure Schemes for Secret Sharing and Key Distribution [D ] . PhD Thesis,Israel Institute of Technology,Technion,Haifa,Israel , 1996 .
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构