標(biāo)準(zhǔn)模型下可證明安全的支持大規(guī)模屬性集與屬性級(jí)用戶(hù)撤銷(xiāo)的CP-ABE方案
doi: 10.11999/JEIT170199
-
2.
(信息工程大學(xué) 鄭州 450000)
基金項(xiàng)目:
國(guó)家973計(jì)劃項(xiàng)目(2013CB338001)
Ciphertext Policy Attribute-based Encryption Scheme Supporting Attribute Level User Revocation Under Large Universe
-
2.
(Information Science and Technology University, Zhengzhou 450000, China)
Funds:
The National 973 Program of China (2013 CB338001)
-
摘要: 密文策略屬性加密方案,特別是不受某個(gè)特定值限制的大規(guī)模屬性集下的密文策略屬性加密方案在云存儲(chǔ)中得到了越來(lái)越廣泛的應(yīng)用,它能夠?qū)崿F(xiàn)細(xì)粒度的訪問(wèn)控制。但是在原始的屬性加密方案中,解決動(dòng)態(tài)的用戶(hù)與屬性撤銷(xiāo),是當(dāng)前面臨的重要挑戰(zhàn)。為了解決這一問(wèn)題,該文提出一個(gè)標(biāo)準(zhǔn)模型下可證明安全的支持大規(guī)模屬性集的密文策略屬性加密方案,該方案能夠?qū)崿F(xiàn)屬性級(jí)的用戶(hù)撤銷(xiāo),即若用戶(hù)的某個(gè)屬性被撤銷(xiāo),不會(huì)影響該用戶(hù)其他合法屬性的正常訪問(wèn)。為了實(shí)現(xiàn)撤銷(xiāo),將密鑰分為兩部分:為用戶(hù)生成的私鑰以及為云存儲(chǔ)中心生成的授權(quán)密鑰。在該方案中,若用戶(hù)的屬性被撤銷(xiāo),那么該屬性對(duì)應(yīng)的密文將進(jìn)行更新,只有該屬性沒(méi)有被撤銷(xiāo)的用戶(hù)才能夠成功地進(jìn)行密鑰更新而解密密文。該文基于q-type 假設(shè)在標(biāo)準(zhǔn)模型下對(duì)方案進(jìn)行了選擇訪問(wèn)結(jié)構(gòu)明文攻擊的安全性證明。最后對(duì)方案進(jìn)行了性能分析與實(shí)驗(yàn)驗(yàn)證,實(shí)驗(yàn)結(jié)果表明,與已有相關(guān)方案相比,雖然為了實(shí)現(xiàn)屬性撤銷(xiāo),增加了存儲(chǔ)中心的計(jì)算負(fù)載,但是不需要屬性中心的參與,因此降低了屬性中心的計(jì)算負(fù)載,而且用戶(hù)除了密鑰外不需要其它額外參數(shù)來(lái)實(shí)現(xiàn)屬性撤銷(xiāo),因此大大節(jié)省了存儲(chǔ)空間。
-
關(guān)鍵詞:
- 密文策略屬性加密 /
- 數(shù)據(jù)外包 /
- 大規(guī)模屬性集 /
- 屬性級(jí)的用戶(hù)撤銷(xiāo)
Abstract: Ciphertext-Policy Attribute-Based Encryption (CP-ABE), especially large universe CP-ABE that is not bounded with the attribute set, is getting the more and the more extensive application to the cloud storage. However, there exists an important challenge in original large universe CP-ABE, namely dynamic user and attribute revocation. In this paper, a large universe CP-ABE scheme with efficient attribute level user revocation is proposed, namely the revocation to an attribute of some user can not influence the common access of other legitimate attributes. To achieve the revocation, the master key is divided into two parts: delegation key and secret key, which are sent to the cloud provider and user separately. In this scheme proposed, if an attribute is revoked, then the ciphertext corresponding to this attribute should be updated so that only persons who are not revoked will be able to carry out key updating and decrypt the ciphertext successfully. Note that, the proposed scheme is proved selectively secure in the standard model under q-type assumption. Finally, the performance analysis and experimental verification are carried out in this paper, and the experimental results show that, compared with the existing revocation schemes, although the proposed scheme increases the Computational load of Storage service Provider (CSP) in order to achieve the attribute revocation, it does not need the participation of Attribute Authority (AA), which reduces the computational load of AA. Moreover, the user does not need any additional parameters to achieve the attribute revocation except of the private key, thus saving the storage space greatly. -
YADAV U C. Ciphertext-policy attribute-based encryption with hiding access structure[C]. 2015 IEEE International Advance Computing Conference (IACC), Bangalore, India, 2015: 6-10. doi: 10.1109/IADCC.2015.7154664. SAHAI A and WATERS B. Fuzzy Identity-Based Encryption [M]. Heidelberg, Berlin, Springer, 2005: 457-473. doi: 10.1007 /11426639_27. WANG M, ZHANG Z, and CHEN C. Security analysis of a privacy-preserving decentralized ciphertext-policy attribute- based encryption scheme[J]. Concurrency Computation Practice Experience, 2016, 28(4): 1237-1245. doi: 10.1002/ cpe.3623. NARUSE T, MOHRI M, and SHIRAISHI Y. Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating[J]. Human-centric Computing and Information Sciences, 2015, 5(1): 1-13. doi: 10.1186/s13673-015-0027-0. LEWKO A, OKAMOTO T, SAHAI A, et al. Fully Secure Functional Encryption: Attribute-based Encryption and (Hierarchical) inner Product Encryption[M]. Heidelberg, Berlin, Springer, 2010: 62-91. doi: 10.1007/978-3-642-13190- 5_4. RAHULAMATHAVAN Y, VELURU S, HAN J, et al. User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption[J]. IEEE Transactions on Computers, 2016, 65(9): 2939-2946. doi: 10.1109/TC.2015.2510646. LEWKO A and WATERS B. Unbounded HIBE and attribute-based encryption[C]. International Conference on Theory and Applications of Cryptographic Techniques: Advances in Cryptology, Tallinn, Estonia, 2011: 547-567. ROUSELAKIS Y and WATERS B. Practical constructions and new proof methods for large universe attribute-based encryption[C]. ACM Sigsac Conference on Computer Communications Security, Berlin, Germany, 2013: 463-474. OSTROVSKY R, SAHAI A, and WATERS B. Attribute- based encryption with non-monotonic access structures[C]. CCS 07 ACM Conference on Computer Communications Security, Alexandria, Virginia, USA, 2007: 195-203. STADDON J, GOLLE P, et al. A content-driven access control system[C]. Proceedings of the 7th Symposium on Identity and Trust on the Internet, Gaithersburg, Maryland, USA, 2008: 26-35. LIANG X, LU R, and LIN X. Ciphertext policy attribute based encryption with efficient revocation[OL]. https:// www.ResearchGate.net/publication/255670422, 2010. BETHENCOURT J, SAHAI A, and WATERS B. Ciphertext-policy attribute-based encryption[C]. IEEE Symposium on Security and Privacy, Oakland, California, USA, 2007: 321-334. BOLDYREVA A, GOYAL V, and KUMAR V. Identity- based encryption with efficient revocation[C]. ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2008: 417-426. PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure attribute-based systems[C]. ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 2006: 799-837. YANG K, JIA X, and REN K. Attribute-based fine-grained access control with efficient revocation in cloud storage systems[C]. ACM Sigsac Symposium on Information, Computer and Communications Security, Denver, Colorado, 2015: 523-528. HUR J and NOH D K. Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel Distributed Systems, 2011, 22(7): 1214-1221. BONEH D and BOYEN X. Efficient selective-ID Secure identity-based encryption without random oracles[C]. Advancesin Cryptology-EUROCRYPT 2004, Lecture Notes in Computer Science, Berlin, Heidelberg, 2004, 3027: 223-238. DAN B, GENTRY C, and WATERS B. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys[M]. Heidelberg, Berlin, Springer, 2005: 258-275. -
計(jì)量
- 文章訪問(wèn)數(shù): 867
- HTML全文瀏覽量: 130
- PDF下載量: 217
- 被引次數(shù): 0