具有兩個可撤銷屬性列表的密鑰策略的屬性加密方案
doi: 10.11999/JEIT150845
-
2.
(西安理工大學(xué)理學(xué)院 西安 710054) ②(陜西省網(wǎng)絡(luò)計算與安全技術(shù)重點實驗室 西安 710048)
國家自然科學(xué)基金(61173192, 61572019), 2014年度西安市碑林區(qū)科技計劃(GX1407),陜西省自然科學(xué)基礎(chǔ)研究計劃-重點項目(2016JZ001)
Revocable Key-policy Attribute-based Encryption Scheme with Two Revocation Lists
-
2.
(School of Sciences, Xi&rsquo
The National Natural Science Foundation of China (61173192, 61572019), Beilin District Science and Technology Plan of Xi,an City 2014 (GX1407), The Key Project of Natural Science Foundation of Shaanxi Province of China (2016JZ001)
-
摘要: 可撤銷的屬性加密方案是屬性加密方案的延伸和擴(kuò)展。該文構(gòu)造了細(xì)粒度屬性撤銷下的具有兩個可撤銷屬性列表的密鑰策略的屬性加密方案,該方案是對含有單個屬性撤銷列表方案的推廣,新方案涉及兩個屬性撤銷列表,允許兩個列表中被撤銷用戶存在交集或者無關(guān),同時利用追蹤算法,判定了用戶與私鑰的關(guān)聯(lián)性。在選擇安全模型下證明了方案的安全性,將方案的安全性規(guī)約到求解判定性雙線性Diffie-Hellman 指數(shù)問題上。Abstract: Revocable attribute-based encryption is an extension and generalization of attribute-based encryption. In this paper, a revocable key-policy attribute-based encryption scheme is constructed with two revocation lists, it extends a previous scheme which is designed with only one attribute revocation list, and in the new scheme two attribute revocation lists are involved, and the two lists are independent with each other. Whats more, the new scheme enjoys an important property that the trace algorithm return the user associated with this decryption key. Finally, under the assumption of decisional Bilinear Diffie-Hellman Exponent (BDHE), the proposed scheme is proved that is secure in the selective security model.
-
Key words:
- Attribute-based encryption /
- Key policy /
- Bilinear maps /
- Revocation
-
SAHAI A and WATERS B. Fuzzy identity-based encryption [J]. Lecture Notes in Computer Science, 2005, 3494: 457-473. doi: 10.1007/11426639_27. YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[C]. ACM Symposium on Information, ACM, 2010: 261-270. doi: 10.1145/1755688. 1755720. PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure attribute-based systems[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006: 99-112. BOLDYREVA A, GOYAL V, and KUMAR V. Identity- based encryption with efficient revocation[C]. Proceedings of the 15th ACM Conference on Computer and Communications Security, New York, 2008: 417-426. HINEK M J, JIANG S, SAFAVI-NAINI R, et al. Attribute- based encryption with key cloning protection[J]. Bulletin of the Korean Mathematical Society, 2008, 2008(4): 803-819. LI J, REN K, and KIM K. A2BE: Accountable attribute- based encryption for abuse free access control[J]. IACR Cryptology ePrint Archive, 2009: 118. ATTRAPADUNG N and IMAI H. Conjunctive broadcast and attribute-based encryption[C]. Lecture Notes in Computer Science, 2009, 5671: 248-265. doi: 10.1007/ 978-3-642-03298-1_16. LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[C]. Advances in Cryptology-EUROCRYPT 2010, Springer Berlin Heidelberg, 2010, 6110: 62-91. doi: 10.1007/978-3-642-13190-5_4. VLADIMIR B, DANIEL S, STEINWANDT R, et al. Multi-authority attribute-based encryption with honest-but- curious central authority[J]. International Journal of Computer Mathematics, 2011, 89(3): 268-283. LI Q, FENG D, and ZHANG L. An attribute based encryption scheme with fine-grained attribute revocation[C]. Global Communications Conference (GLOBECOM), 2012 IEEE, Anaheim, CA, 2012: 885-890. doi: 10.1109/ GLOCOM. 2012.6503225. 張彥華, 胡予濮, 江明明, 等. 格上可撤銷的基于身份的適應(yīng)性安全的加密方案[J]. 電子與信息學(xué)報, 2015, 37(2): 423-428. doi: 10.11999/JEIT140421. ZHANG Yanhua, HU Yupu, JIANG Mingming et al. A lattice-based revocable adaptive-ID secure encryption scheme [J]. Journal of Electronics Information Technology, 2015, 37(2): 423-428. doi: 10.11999/JEIT140421. LI Yang, ZHU Jianming, WANG Xiuli, et al. Optimized ciphertext-policy attribute-based encryption with efficient revocation[J]. International Journal of Security and Its Applications, 2013, 7(6): 385-394. 張應(yīng)輝, 鄭東, 李進(jìn), 等. 密文長度恒定且屬性直接可撤銷的基于屬性的加密[J]. 密碼學(xué)報, 2014, 1(5): 465-480. ZHANG Yinghui, ZHENG Dong, LI Jin, et al. Attribute directly-revocable attribute-based encryption with constant ciphertext length[J]. Journal of Cryptologic Research, 2014, 1(5): 465-480. VANCE A, LOWRY P B, and EGGETT D. A new approach to the problem of access policy violations: Increasing perceptions of accountability through the user interface[J]. MIS Quarterly, 2015, 39(2): 345-366. CL?MENTINE G, SUSILO W, and PLANTARD T. Efficient File Sharing in Electronic Health Records [M].?Information Security Practice and Experience. Springer International Publishing, 2015: 499-513. 魏江宏, 胡學(xué)先, 劉文芬. 多屬性機(jī)構(gòu)環(huán)境下的屬性基認(rèn)證密鑰交換協(xié)議[J]. 電子與信息學(xué)報, 2012, 34(2): 451-456. doi: 10.3724/SP.J.1146.2011.00701. WEI Jianghong, HU Xuexian, and LIU Wenfen. Attribute- based authenticated key exchange protocol in multiple attribute authorities environment[J]. Journal of Electronics Information Technology, 2012, 34(2): 451-456. doi: 10.3724/ SP.J.1146.2011.00701. -
計量
- 文章訪問數(shù): 1342
- HTML全文瀏覽量: 149
- PDF下載量: 513
- 被引次數(shù): 0