一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

定長(zhǎng)密文且快速解密的分布式屬性基加密方案研究

趙志遠(yuǎn) 王建華 徐開勇

趙志遠(yuǎn), 王建華, 徐開勇. 定長(zhǎng)密文且快速解密的分布式屬性基加密方案研究[J]. 電子與信息學(xué)報(bào), 2017, 39(11): 2724-2732. doi: 10.11999/JEIT170072
引用本文: 趙志遠(yuǎn), 王建華, 徐開勇. 定長(zhǎng)密文且快速解密的分布式屬性基加密方案研究[J]. 電子與信息學(xué)報(bào), 2017, 39(11): 2724-2732. doi: 10.11999/JEIT170072
ZHAO Zhiyuan, WANG Jianhua, XU Kaiyong. Distributed Attribute-based Encryption with Constant-size Ciphertext and Fast Decryption[J]. Journal of Electronics & Information Technology, 2017, 39(11): 2724-2732. doi: 10.11999/JEIT170072
Citation: ZHAO Zhiyuan, WANG Jianhua, XU Kaiyong. Distributed Attribute-based Encryption with Constant-size Ciphertext and Fast Decryption[J]. Journal of Electronics & Information Technology, 2017, 39(11): 2724-2732. doi: 10.11999/JEIT170072

定長(zhǎng)密文且快速解密的分布式屬性基加密方案研究

doi: 10.11999/JEIT170072
基金項(xiàng)目: 

國(guó)家973計(jì)劃項(xiàng)目(2013CB 338000),國(guó)家重點(diǎn)研發(fā)計(jì)劃(2016YFB0501900)

Distributed Attribute-based Encryption with Constant-size Ciphertext and Fast Decryption

Funds: 

The National 973 Program of China (2013CB338000), The National Key Research Program of China (2016YFB0501900)

  • 摘要: 屬性基加密因其細(xì)粒度訪問控制在云存儲(chǔ)中得到廣泛應(yīng)用。但原始屬性基加密方案中單授權(quán)機(jī)構(gòu)帶來了分發(fā)私鑰的計(jì)算瓶頸與信任問題。為解決上述問題,該文基于素?cái)?shù)階雙線性群構(gòu)造了一種分布式屬性基加密方案,方案中授權(quán)機(jī)構(gòu)由多個(gè)權(quán)威中心和多個(gè)屬性中心組成。權(quán)威中心負(fù)責(zé)系統(tǒng)建立及用戶身份相關(guān)密鑰生成,且每次用戶私鑰申請(qǐng)過程中只需一個(gè)權(quán)威中心參與工作,采用多權(quán)威中心的目的是提高系統(tǒng)的穩(wěn)定性和降低權(quán)威中心的計(jì)算量;屬性中心負(fù)責(zé)不同的屬性域,相互獨(dú)立甚至不需要知道其它屬性中心的存在。同時(shí),該方案的密文長(zhǎng)度與屬性數(shù)量無關(guān),為一個(gè)常值;在解密運(yùn)算過程中需要的對(duì)運(yùn)算與屬性數(shù)量也無關(guān),為2個(gè)對(duì)運(yùn)算。該文基于q-Bilinear Diffie-Hellman Exponent假設(shè)在隨機(jī)預(yù)言機(jī)模型下對(duì)方案進(jìn)行了選擇明文攻擊的安全性證明。最后從理論和實(shí)驗(yàn)兩方面對(duì)所提方案的功能與效率進(jìn)行了分析與驗(yàn)證。實(shí)驗(yàn)結(jié)果表明所提方案具有固定密文長(zhǎng)度和快速解密的能力,大大減少了存儲(chǔ)負(fù)擔(dān)并提高了系統(tǒng)效率。
  • ZHANG Yuqing, WANG Xiaofei, LIU Xuefeng, et al. Survey on cloud computing security[J]. Journal of Software, 2016, 27(6): 1328-1348. doi: 10.13328/j.cnki.jos.005004.
    張玉清, 王曉菲, 劉雪峰, 等. 云計(jì)算環(huán)境安全綜述[J]. 軟件學(xué)報(bào), 2016, 27(6): 1328-1348. doi: 10.13328/j.cnki.jos.005004.
    BETHENCOURT J, SAHAI A, and WATERS B. Ciphertext-policy attribute-based encryption[C]. IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, 2007: 321-334. doi: 10.1109/SP.2007.11.
    JUNG T, Li X Y, WAN Z, et al. Control cloud data access privilege and anonymity with fully anonymous attribute- based encryption[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(1): 190-199. doi: 10.1109/ TIFS.2014.2368352.
    唐強(qiáng), 姬東耀. 多授權(quán)中心可驗(yàn)證的基于屬性的加密方案[J]. 武漢大學(xué)學(xué)報(bào)(理學(xué)版), 2008, 54(5): 607-610. doi: 10.14188/j. 1671-8836.2008.05.029.
    TANG Qiang and JI Dongyao. Multi-authority verifiable attribute-based encryption[J]. Journal of Wuhan University (Natural Science Edition), 2008, 54(5): 607-610. doi: 10.14188 /j.1671-8836.2008.05.029.
    CHASE M. Multi-authority attribute based encryption[C]. Theory of Cryptography Conference, Amsterdam, The Netherlands, 2007: 515-534. doi: 10.1007/978-3-540-70936 -7_28.
    肖思煜, 葛愛軍, 馬傳貴. 去中心化且固定密文長(zhǎng)度的基于屬性加密方案[J]. 計(jì)算機(jī)研究與發(fā)展, 2016, 53(10): 2207-2215. doi: 10.7544/issn1000-1239.2016.20160459.
    XIAO Siyu, GE Aijun, and MA Chuangui. Decentralized attribute-based encryption scheme with constant-size ciphertexts[J]. Journal of Computer Research and Development, 2016, 53(10): 2207-2215. doi: 10.7544/issn1000 -1239.2016.20160459.
    CHASE M and CHOW S S M. Improving privacy and security in multi-authority attribute-based encryption[C]. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, 2009: 121-130. doi: 10.1145/1653662.1653678.
    LEWKO A and WATERS B. Decentralizing attribute-based encryption[C]. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, 2011: 568-588. doi: 10.1007/978-3-642- 20465-4_31.
    LIU Z, CAO Z, HUANG Q, et al. Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles[C]. European Symposium on Research in Computer Security, Leuven, Belgium, 2011: 278-297. doi: 10.1007/978- 3-642-23822-2_16.
    ROUSELAKIS Y and WATERS B. Efficient statically-secure large-universe multi-authority attribute-based encryption[C]. International Conference on Financial Cryptography and Data Security, San Juan, Puerto Rico, 2015: 315-332. doi: 10.1007/978-3-662-47854-7_19.
    ZHONG H, ZHU W, XU Y, et al. Multi-authority attribute- based encryption access control scheme with policy hidden for cloud storage[J]. Soft Computing, 2016: 1-9. doi: 10.1007 /s00500-016-2330-8.
    SCOTT-HAYWARD S, NATARAJAN S, and SEZER S. A survey of security in software defined networks[J]. IEEE Communications Surveys Tutorials, 2016, 18(1): 623-654. doi: 10.1109/COMST.2015.2453114.
    BLENK A, BASTA A, REISSLEIN M, et al. Survey on network virtualization hypervisors for software defined networking[J]. IEEE Communications Surveys Tutorials, 2016, 18(1): 655-685. doi: 10.1109/COMST.2015.2489183.
    CHOW S S M. A framework of multi-authority attribute- based encryption with outsourcing and revocation[C]. Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, Shanghai, China, 2016: 215-226. doi: 10.1145/2914642.2914659.
    LUO E, LIU Q, and WANG G. Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks[J]. IEEE Communications Letters, 2016, 20(9): 1772-1775. doi: 10.1109/LCOMM.2016.2584614.
    魏江宏, 胡學(xué)先, 劉文芬. 多屬性機(jī)構(gòu)環(huán)境下的屬性基認(rèn)證密鑰交換協(xié)議[J]. 電子與信息學(xué)報(bào), 2012, 34(2): 451-456. doi: 10.3724/SP.J.1146.2011.00701.
    WEI Jianghong, HU Xuexian, and LIU Wenfen. Attribute- based authenticated key exchange protocol in multiple attribute authorities environment[J]. Journal of Electronics Information Technology, 2012, 34(2): 451-456. doi: 10.3724 /SP.J.1146.2011.00701.
    馮登國(guó), 陳成. 屬性密碼學(xué)研究[J]. 密碼學(xué)報(bào), 2014, 1(1): 1-12. doi: 10.13868/j.cnki.jcr.000001.
    FENG Dengguo and CHEN Cheng. Research on attribute- based cryptography[J]. Journal of Cryptologic Research, 2014, 1(1): 1-12. doi: 10.13868/j.cnki.jcr.000001.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  1653
  • HTML全文瀏覽量:  181
  • PDF下載量:  233
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2017-01-19
  • 修回日期:  2017-06-02
  • 刊出日期:  2017-11-19

目錄

    /

    返回文章
    返回