was considered to be an important method for anonymous authentication in cloud computing.However
normal ABS only provided simple access control through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud.Moreover
the attribute sets were supervised by only one attribute authority
which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached.Aiming at tackling the problems above
a novel scheme
was proposed called multi-authority ABS supporting dendritic access structure which supported any AND
OR and threshold gates and affords more flexible access control.Meanwhile
the attribute sets of users were classified by diverse attribute authorities which reduced the overhead and the risk of systems.Besides
the scheme is proved to be selective predicate chosen message attack secure in the random oracle model.
关键词
Keywords
references
SAHAI A , WATERS B . Fuzzy identity-based encryption [M ] . Advances in Cryptology–EUROCRYPT 2005 . Springer Berlin Heidelberg , 2005 : 457 - 473 .
BONEH D , FRANKLIN M . Identity-based encryption from the Weil pairing [C ] // Annual International Cryptology Conference . Springer Berlin Heidelberg , 2001 : 213 - 229 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // The 13th ACM Conference on Computer and Communications Security . ACM , 2006 : 89 - 98 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // IEEE Symposium on Security and Privacy . Computer Society , 2007 : 321 - 334 .
CHASE M . Multi-authority attribute based encryption [M ] . Theory of Cryptography . Springer Berlin Heidelberg , 2007 : 515 - 534 .
WATERS B , . Efficient identity-based encryption without random oracles [C ] // Annual International Conference on the Theory and Applications of Cryptographic Techniques.Springer Berlin Heidelberg . 2005 : 114 - 127 .
YANG P , CAO Z , DONG X . Fuzzy identity based signature [J ] . IACR Cryptology ePrint Archive , 2008 : 2 .
MAJI H K , PRABHAKARAN M , ROSULEK M . Attribute-based signatures [C ] // Cryptographers’ Track at the RSA Conference . Springer Berlin Heidelberg , 2011 : 376 - 392 .
LI J , AU M H , SUSILO W , et al . Attribute-based signature and its applications [C ] // The 5th ACM Symposium on Information,Computer and Communications Security . ACM , 2010 : 60 - 69 .
SU J , CAO D , ZHAO B , et al . ePASS:An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things [J ] . Future Generation Computer Systems , 2014 , 33 : 11 - 18 .
LI J , CHEN X , HUANG X . New attribute–based authentication and its application in anonymous cloud access service [J ] . International Journal of Web and Grid Services , 2015 , 11 ( 1 ): 125 - 141 .
CHASE M , CHOW S S M . Improving privacy and security in multi-authority attribute-based encryption [C ] // The 16th ACM Conference on Computer and Communications Security . ACM , 2009 : 121 - 130 .