一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機號碼
標(biāo)題
留言內(nèi)容
驗證碼

基于屬性加密的云存儲方案研究

王光波 王建華

王光波, 王建華. 基于屬性加密的云存儲方案研究[J]. 電子與信息學(xué)報, 2016, 38(11): 2931-2939. doi: 10.11999/JEIT160064
引用本文: 王光波, 王建華. 基于屬性加密的云存儲方案研究[J]. 電子與信息學(xué)報, 2016, 38(11): 2931-2939. doi: 10.11999/JEIT160064
WANG Guangbo, WANG Jianhua. Research on Cloud Storage Scheme with Attribute-based Encryption[J]. Journal of Electronics & Information Technology, 2016, 38(11): 2931-2939. doi: 10.11999/JEIT160064
Citation: WANG Guangbo, WANG Jianhua. Research on Cloud Storage Scheme with Attribute-based Encryption[J]. Journal of Electronics & Information Technology, 2016, 38(11): 2931-2939. doi: 10.11999/JEIT160064

基于屬性加密的云存儲方案研究

doi: 10.11999/JEIT160064
基金項目: 

國家高技術(shù)研究發(fā)展計劃(2012AA012704),鄭州市科技領(lǐng)軍人才項目(131PLJRC644)

Research on Cloud Storage Scheme with Attribute-based Encryption

Funds: 

The National High-tech RD Program of China (2012AA012704), The Science and Technology Leading Talent Project of Zhengzhou (131PLJRC644)

  • 摘要: 云存儲中往往采用屬性加密方案來實現(xiàn)細(xì)粒度的訪問控制,為了進一步保護訪問控制策略中的敏感信息,并解決授權(quán)中心單獨為用戶生成密鑰而產(chǎn)生的密鑰托管問題。該文對訪問控制策略中的屬性進行重新映射,以實現(xiàn)其隱私性。另外在密鑰生成算法中設(shè)計一個雙方計算協(xié)議,由用戶產(chǎn)生密鑰的部分組件,與授權(quán)中心共同生成密鑰以解決密鑰托管問題。最后在標(biāo)準(zhǔn)模型下對方案進行了安全證明,并進行了性能分析與實驗驗證,實驗結(jié)果表明,與已有相關(guān)方案相比,雖然為了實現(xiàn)訪問控制策略隱藏并且解決密鑰托管問題增加了額外的計算負(fù)載, 但是由于該文將大部分解密工作授權(quán)給云存儲中心來執(zhí)行,因此數(shù)據(jù)訪問者的計算負(fù)載較小。
  • SAHAI A and WATERS B. Fuzzy Identity-Based Encryption [M]. Heidelberg, Berlin, Springer, 2005: 457-473. doi: 10.1007 /11426639_27.
    YADAV U C. Ciphertext-policy attribute-based encryption with hiding access structure[C]. 2015 IEEE International Advance Computing Conference (IACC), Bangalore, India, 2015: 6-10. doi: 10.1109/IADCC.2015.7154664.
    NARUSE T, MOHRI M, and SHIRAISHI Y. Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating[J]. Human-centric Computing and Information Sciences, 2015, 5(1): 1-13.
    WANG H, YANG B, and WANG Y. Server aided ciphertext- policy attribute-based encryption[C]. IEEE International Conference on Advanced Information Networking Applications Workshops, Gwangju, Korea, 2015: 440-444. doi: 10.1109/WAINA.2015.11.
    QI L, MA J, RUI L, et al. Large universe decentralized key- policy attribute-based encryption[J]. Security Communi- cation Networks, 2015, 8(3): 501-509.
    WANG X, ZHANG J, SCHOOLER E M, et al. Performance evaluation of attribute-based encryption: Toward data privacy in the IoT[C]. IEEE International Conference on Communications (ICC), Sydney, Australia, 2014: 725-730.
    KAPADIA A, TSANG P P, and SMITH S W. Attribute- based publishing with hidden credentials and hidden policies [C]. Network and Distributed System Security Symposium, NDSS 2007, San Diego, CA, USA, 2007: 179-192.
    NISHIDE T, YONEYAMA K, and OHTA K. Attribute- based Encryption with Partially Hidden Encryptor-specified Access Structures[M]. Heidelberg, Berlin, Springer, 2008: 111-129. doi: 10.1007/978-3-540-68914-0_7.
    LAI J, DENG R H, and LI Y. Fully secure cipertext-policy hiding CP-ABE[J]. Lecture Notes in Computer Science, 2011, 6672: 24-39.
    王海斌, 陳少真. 隱藏訪問結(jié)構(gòu)的基于屬性加密方案[J]. 電子與信息學(xué)報, 2012, 34(2): 457-461.
    WANG Haibin and CHEN Shaozhen. Attribute-based encryption with hidden access structures[J]. Journal of Electronics Information Technology, 2012, 34(2): 457-461.
    HUR J. Attribute-based secure data sharing with hidden policies in smart grid[J]. IEEE Transactions on Parallel Distributed Systems, 2013, 24(11): 2171-2180. doi: 10.1109/ TPDS.2012.61.
    宋衍, 韓臻, 劉鳳梅, 等. 基于訪問樹的策略隱藏屬性加密方案[J]. 通信學(xué)報, 2015, 36(9): 119-126.
    SONG Yan, HAN Zhen, LIU Fengmei, et al. Attribute-based encryption with hidden policies in the access tree[J]. Journal on Communications, 2015, 36(9): 119-126.
    LUAN Ibraimi, QIANG Tang, PITER Hartel, et al. Efficient and Provable Secure Ciphertext-policy Attribute-Based Encryption Schemes. Information Security Practice and Experience[M]. Heidelberg, Berlin, Springer, 2009: 1-12.
    CHASE M and CHOW S S M. Improving privacy and security in multi-authority attribute-based encryption[C]. ACM Conference on Computer and Communications Security, Chicago, IL, USA, 2009: 121-130. doi: 10.1145/1653662. 1653678.
    YANG M, LIU F, HAN J L, et al. An efficient attribute based encryption scheme with revocation for outsourced data sharing control[C]. 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control, Beijing, China, 2011: 516-520.
    LIU Z, CAO Z, and WONG D. Traceable ciphertext-policy attribute-based encryption supporting any monotone access structures[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(1): 76-88.
    BONEH D and BOYEN X. Short signatures without random oracles[C]. Advances in Cryptology-EUROCRYPT 2004, Switzerland, 2004: 56-73.
    ZAVATTONI E, PEREZ L J D, MITSUNARI S, et al. Software implementation of an attribute-based encryption scheme[J]. IEEE Transactions on Computers, 2015, 64(5): 1429-1441. [19] CHEUNG L and NEWPORT C. Provably secure ciphertext policy ABE[C]. Proceedings of the 14th ACM Conference on Computer and Communications Security, New York, USA, 2007: 456-465. doi: 10.1145/1315245.1315302.
    LEWKO A, OKAMOTO T, SAHAI A, et al. Fully Secure Functional Encryption: Attribute-based Encryption and (Hierarchical) Inner Product Encryption[M]. Heidelberg, Berlin, Springer, 2010: 62-91. doi: 10.1007/978-3-642-13190- 5_4.
    BELENKIY M, CAMENISCH J, CHASE M, et al. Randomizable Proofs and Delegatable Anonymous Credentials[M]. Heidelberg, Berlin, Springer, 2009: 108-125. doi: 10.1007/978-3-642-03356-8_7.
  • 加載中
計量
  • 文章訪問數(shù):  1449
  • HTML全文瀏覽量:  144
  • PDF下載量:  725
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2016-01-15
  • 修回日期:  2016-08-15
  • 刊出日期:  2016-11-19

目錄

    /

    返回文章
    返回