一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號碼
標(biāo)題
留言內(nèi)容
驗證碼

具有兩個可撤銷屬性列表的密鑰策略的屬性加密方案

王尚平 余小娟 張亞玲

王尚平, 余小娟, 張亞玲. 具有兩個可撤銷屬性列表的密鑰策略的屬性加密方案[J]. 電子與信息學(xué)報, 2016, 38(6): 1406-1411. doi: 10.11999/JEIT150845
引用本文: 王尚平, 余小娟, 張亞玲. 具有兩個可撤銷屬性列表的密鑰策略的屬性加密方案[J]. 電子與信息學(xué)報, 2016, 38(6): 1406-1411. doi: 10.11999/JEIT150845
WANG Shangping, YU Xiaojuan, ZHANG Yaling. Revocable Key-policy Attribute-based Encryption Scheme with Two Revocation Lists[J]. Journal of Electronics & Information Technology, 2016, 38(6): 1406-1411. doi: 10.11999/JEIT150845
Citation: WANG Shangping, YU Xiaojuan, ZHANG Yaling. Revocable Key-policy Attribute-based Encryption Scheme with Two Revocation Lists[J]. Journal of Electronics & Information Technology, 2016, 38(6): 1406-1411. doi: 10.11999/JEIT150845

具有兩個可撤銷屬性列表的密鑰策略的屬性加密方案

doi: 10.11999/JEIT150845
基金項目: 

國家自然科學(xué)基金(61173192, 61572019), 2014年度西安市碑林區(qū)科技計劃(GX1407),陜西省自然科學(xué)基礎(chǔ)研究計劃-重點項目(2016JZ001)

Revocable Key-policy Attribute-based Encryption Scheme with Two Revocation Lists

Funds: 

The National Natural Science Foundation of China (61173192, 61572019), Beilin District Science and Technology Plan of Xi,an City 2014 (GX1407), The Key Project of Natural Science Foundation of Shaanxi Province of China (2016JZ001)

  • 摘要: 可撤銷的屬性加密方案是屬性加密方案的延伸和擴(kuò)展。該文構(gòu)造了細(xì)粒度屬性撤銷下的具有兩個可撤銷屬性列表的密鑰策略的屬性加密方案,該方案是對含有單個屬性撤銷列表方案的推廣,新方案涉及兩個屬性撤銷列表,允許兩個列表中被撤銷用戶存在交集或者無關(guān),同時利用追蹤算法,判定了用戶與私鑰的關(guān)聯(lián)性。在選擇安全模型下證明了方案的安全性,將方案的安全性規(guī)約到求解判定性雙線性Diffie-Hellman 指數(shù)問題上。
  • SAHAI A and WATERS B. Fuzzy identity-based encryption [J]. Lecture Notes in Computer Science, 2005, 3494: 457-473. doi: 10.1007/11426639_27.
    YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[C]. ACM Symposium on Information, ACM, 2010: 261-270. doi: 10.1145/1755688. 1755720.
    PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure attribute-based systems[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006: 99-112.
    BOLDYREVA A, GOYAL V, and KUMAR V. Identity- based encryption with efficient revocation[C]. Proceedings of the 15th ACM Conference on Computer and Communications Security, New York, 2008: 417-426.
    HINEK M J, JIANG S, SAFAVI-NAINI R, et al. Attribute- based encryption with key cloning protection[J]. Bulletin of the Korean Mathematical Society, 2008, 2008(4): 803-819.
    LI J, REN K, and KIM K. A2BE: Accountable attribute- based encryption for abuse free access control[J]. IACR Cryptology ePrint Archive, 2009: 118.
    ATTRAPADUNG N and IMAI H. Conjunctive broadcast and attribute-based encryption[C]. Lecture Notes in Computer Science, 2009, 5671: 248-265. doi: 10.1007/ 978-3-642-03298-1_16.
    LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[C]. Advances in Cryptology-EUROCRYPT 2010, Springer Berlin Heidelberg, 2010, 6110: 62-91. doi: 10.1007/978-3-642-13190-5_4.
    VLADIMIR B, DANIEL S, STEINWANDT R, et al. Multi-authority attribute-based encryption with honest-but- curious central authority[J]. International Journal of Computer Mathematics, 2011, 89(3): 268-283.
    LI Q, FENG D, and ZHANG L. An attribute based encryption scheme with fine-grained attribute revocation[C]. Global Communications Conference (GLOBECOM), 2012 IEEE, Anaheim, CA, 2012: 885-890. doi: 10.1109/ GLOCOM. 2012.6503225.
    張彥華, 胡予濮, 江明明, 等. 格上可撤銷的基于身份的適應(yīng)性安全的加密方案[J]. 電子與信息學(xué)報, 2015, 37(2): 423-428. doi: 10.11999/JEIT140421.
    ZHANG Yanhua, HU Yupu, JIANG Mingming et al. A lattice-based revocable adaptive-ID secure encryption scheme [J]. Journal of Electronics Information Technology, 2015, 37(2): 423-428. doi: 10.11999/JEIT140421.
    LI Yang, ZHU Jianming, WANG Xiuli, et al. Optimized ciphertext-policy attribute-based encryption with efficient revocation[J]. International Journal of Security and Its Applications, 2013, 7(6): 385-394.
    張應(yīng)輝, 鄭東, 李進(jìn), 等. 密文長度恒定且屬性直接可撤銷的基于屬性的加密[J]. 密碼學(xué)報, 2014, 1(5): 465-480.
    ZHANG Yinghui, ZHENG Dong, LI Jin, et al. Attribute directly-revocable attribute-based encryption with constant ciphertext length[J]. Journal of Cryptologic Research, 2014, 1(5): 465-480.
    VANCE A, LOWRY P B, and EGGETT D. A new approach to the problem of access policy violations: Increasing perceptions of accountability through the user interface[J]. MIS Quarterly, 2015, 39(2): 345-366.
    CL?MENTINE G, SUSILO W, and PLANTARD T. Efficient File Sharing in Electronic Health Records [M].?Information Security Practice and Experience. Springer International Publishing, 2015: 499-513.
    魏江宏, 胡學(xué)先, 劉文芬. 多屬性機(jī)構(gòu)環(huán)境下的屬性基認(rèn)證密鑰交換協(xié)議[J]. 電子與信息學(xué)報, 2012, 34(2): 451-456. doi: 10.3724/SP.J.1146.2011.00701.
    WEI Jianghong, HU Xuexian, and LIU Wenfen. Attribute- based authenticated key exchange protocol in multiple attribute authorities environment[J]. Journal of Electronics Information Technology, 2012, 34(2): 451-456. doi: 10.3724/ SP.J.1146.2011.00701.
  • 加載中
計量
  • 文章訪問數(shù):  1342
  • HTML全文瀏覽量:  149
  • PDF下載量:  513
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2015-07-13
  • 修回日期:  2016-02-29
  • 刊出日期:  2016-06-19

目錄

    /

    返回文章
    返回