一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問(wèn)題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言?xún)?nèi)容
驗(yàn)證碼

標(biāo)準(zhǔn)模型下可證明安全的支持大規(guī)模屬性集與屬性級(jí)用戶(hù)撤銷(xiāo)的CP-ABE方案

王建華 王光波 徐開(kāi)勇

王建華, 王光波, 徐開(kāi)勇. 標(biāo)準(zhǔn)模型下可證明安全的支持大規(guī)模屬性集與屬性級(jí)用戶(hù)撤銷(xiāo)的CP-ABE方案[J]. 電子與信息學(xué)報(bào), 2017, 39(12): 3013-3022. doi: 10.11999/JEIT170199
引用本文: 王建華, 王光波, 徐開(kāi)勇. 標(biāo)準(zhǔn)模型下可證明安全的支持大規(guī)模屬性集與屬性級(jí)用戶(hù)撤銷(xiāo)的CP-ABE方案[J]. 電子與信息學(xué)報(bào), 2017, 39(12): 3013-3022. doi: 10.11999/JEIT170199
WANG Jianhua, WANG Guangbo, XU Kaiyong. Ciphertext Policy Attribute-based Encryption Scheme Supporting Attribute Level User Revocation Under Large Universe[J]. Journal of Electronics & Information Technology, 2017, 39(12): 3013-3022. doi: 10.11999/JEIT170199
Citation: WANG Jianhua, WANG Guangbo, XU Kaiyong. Ciphertext Policy Attribute-based Encryption Scheme Supporting Attribute Level User Revocation Under Large Universe[J]. Journal of Electronics & Information Technology, 2017, 39(12): 3013-3022. doi: 10.11999/JEIT170199

標(biāo)準(zhǔn)模型下可證明安全的支持大規(guī)模屬性集與屬性級(jí)用戶(hù)撤銷(xiāo)的CP-ABE方案

doi: 10.11999/JEIT170199
基金項(xiàng)目: 

國(guó)家973計(jì)劃項(xiàng)目(2013CB338001)

Ciphertext Policy Attribute-based Encryption Scheme Supporting Attribute Level User Revocation Under Large Universe

Funds: 

The National 973 Program of China (2013 CB338001)

  • 摘要: 密文策略屬性加密方案,特別是不受某個(gè)特定值限制的大規(guī)模屬性集下的密文策略屬性加密方案在云存儲(chǔ)中得到了越來(lái)越廣泛的應(yīng)用,它能夠?qū)崿F(xiàn)細(xì)粒度的訪問(wèn)控制。但是在原始的屬性加密方案中,解決動(dòng)態(tài)的用戶(hù)與屬性撤銷(xiāo),是當(dāng)前面臨的重要挑戰(zhàn)。為了解決這一問(wèn)題,該文提出一個(gè)標(biāo)準(zhǔn)模型下可證明安全的支持大規(guī)模屬性集的密文策略屬性加密方案,該方案能夠?qū)崿F(xiàn)屬性級(jí)的用戶(hù)撤銷(xiāo),即若用戶(hù)的某個(gè)屬性被撤銷(xiāo),不會(huì)影響該用戶(hù)其他合法屬性的正常訪問(wèn)。為了實(shí)現(xiàn)撤銷(xiāo),將密鑰分為兩部分:為用戶(hù)生成的私鑰以及為云存儲(chǔ)中心生成的授權(quán)密鑰。在該方案中,若用戶(hù)的屬性被撤銷(xiāo),那么該屬性對(duì)應(yīng)的密文將進(jìn)行更新,只有該屬性沒(méi)有被撤銷(xiāo)的用戶(hù)才能夠成功地進(jìn)行密鑰更新而解密密文。該文基于q-type 假設(shè)在標(biāo)準(zhǔn)模型下對(duì)方案進(jìn)行了選擇訪問(wèn)結(jié)構(gòu)明文攻擊的安全性證明。最后對(duì)方案進(jìn)行了性能分析與實(shí)驗(yàn)驗(yàn)證,實(shí)驗(yàn)結(jié)果表明,與已有相關(guān)方案相比,雖然為了實(shí)現(xiàn)屬性撤銷(xiāo),增加了存儲(chǔ)中心的計(jì)算負(fù)載,但是不需要屬性中心的參與,因此降低了屬性中心的計(jì)算負(fù)載,而且用戶(hù)除了密鑰外不需要其它額外參數(shù)來(lái)實(shí)現(xiàn)屬性撤銷(xiāo),因此大大節(jié)省了存儲(chǔ)空間。
  • YADAV U C. Ciphertext-policy attribute-based encryption with hiding access structure[C]. 2015 IEEE International Advance Computing Conference (IACC), Bangalore, India, 2015: 6-10. doi: 10.1109/IADCC.2015.7154664.
    SAHAI A and WATERS B. Fuzzy Identity-Based Encryption [M]. Heidelberg, Berlin, Springer, 2005: 457-473. doi: 10.1007 /11426639_27.
    WANG M, ZHANG Z, and CHEN C. Security analysis of a privacy-preserving decentralized ciphertext-policy attribute- based encryption scheme[J]. Concurrency Computation Practice Experience, 2016, 28(4): 1237-1245. doi: 10.1002/ cpe.3623.
    NARUSE T, MOHRI M, and SHIRAISHI Y. Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating[J]. Human-centric Computing and Information Sciences, 2015, 5(1): 1-13. doi: 10.1186/s13673-015-0027-0.
    LEWKO A, OKAMOTO T, SAHAI A, et al. Fully Secure Functional Encryption: Attribute-based Encryption and (Hierarchical) inner Product Encryption[M]. Heidelberg, Berlin, Springer, 2010: 62-91. doi: 10.1007/978-3-642-13190- 5_4.
    RAHULAMATHAVAN Y, VELURU S, HAN J, et al. User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption[J]. IEEE Transactions on Computers, 2016, 65(9): 2939-2946. doi: 10.1109/TC.2015.2510646.
    LEWKO A and WATERS B. Unbounded HIBE and attribute-based encryption[C]. International Conference on Theory and Applications of Cryptographic Techniques: Advances in Cryptology, Tallinn, Estonia, 2011: 547-567.
    ROUSELAKIS Y and WATERS B. Practical constructions and new proof methods for large universe attribute-based encryption[C]. ACM Sigsac Conference on Computer Communications Security, Berlin, Germany, 2013: 463-474.
    OSTROVSKY R, SAHAI A, and WATERS B. Attribute- based encryption with non-monotonic access structures[C]. CCS 07 ACM Conference on Computer Communications Security, Alexandria, Virginia, USA, 2007: 195-203.
    STADDON J, GOLLE P, et al. A content-driven access control system[C]. Proceedings of the 7th Symposium on Identity and Trust on the Internet, Gaithersburg, Maryland, USA, 2008: 26-35.
    LIANG X, LU R, and LIN X. Ciphertext policy attribute based encryption with efficient revocation[OL]. https:// www.ResearchGate.net/publication/255670422, 2010.
    BETHENCOURT J, SAHAI A, and WATERS B. Ciphertext-policy attribute-based encryption[C]. IEEE Symposium on Security and Privacy, Oakland, California, USA, 2007: 321-334.
    BOLDYREVA A, GOYAL V, and KUMAR V. Identity- based encryption with efficient revocation[C]. ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2008: 417-426.
    PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure attribute-based systems[C]. ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 2006: 799-837.
    YANG K, JIA X, and REN K. Attribute-based fine-grained access control with efficient revocation in cloud storage systems[C]. ACM Sigsac Symposium on Information, Computer and Communications Security, Denver, Colorado, 2015: 523-528.
    HUR J and NOH D K. Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel Distributed Systems, 2011, 22(7): 1214-1221.
    BONEH D and BOYEN X. Efficient selective-ID Secure identity-based encryption without random oracles[C]. Advancesin Cryptology-EUROCRYPT 2004, Lecture Notes in Computer Science, Berlin, Heidelberg, 2004, 3027: 223-238.
    DAN B, GENTRY C, and WATERS B. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys[M]. Heidelberg, Berlin, Springer, 2005: 258-275.
  • 加載中
計(jì)量
  • 文章訪問(wèn)數(shù):  867
  • HTML全文瀏覽量:  130
  • PDF下載量:  217
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2017-03-06
  • 修回日期:  2017-08-06
  • 刊出日期:  2017-12-19

目錄

    /

    返回文章
    返回