期刊文献+

基于多认证中心和属性子集的属性加密方案 被引量:1

Attribute Based Encryption with Attribute-sets and Multi-authority
在线阅读 下载PDF
导出
摘要 将有密文规则的基于属性子集的属性加密方案中的想法应用到有多个认证中心的境中,实现了既支持多认证中心,又支持以属性子集的方式定制密文规则的属性加密方案.在我们的属性加密系统中,每个认证中心管理用户不同类别的属性集并且可以定制相应的密文规则进行属性加密;解密时,在每个认证中心上用户的属性集合先要通过这个认证中心上的密文规则的验证,才能够解密得到该认证中心的局部主密钥,只有得到全部局部主密钥才能解密出由系统主密钥加密的密文.同时因为在每个认证中心上支持以属性子集的方式定制密文规则,这使我们的方案能够更好支持复杂的密文规则的定制,所以我们的方案更加适合应用在有多个认证中心并且用户属性和密文规则复杂的环境.另外我们还提出了相应的安全模型并且证明方案的安全性. In this paper we propose a scheme of attribute based encryption with attribute-sets and multi-authority which generalizes cipher policies attribute-sets based encryption(CP-ASBE) to the multi-authority scenario,adds the cipher polices attribute based system within multi-authority.In our cryptosystem,each authority center manage different kind of user′s attributes and encrypt message with cipher policies;when decryption,user′s attributes set is needs to be checked by the corresponding cipher policies on each authority server.If the attributes set is satisfied the policies,the user can get the local master key.If and only if all the local master keys are recovered,the user is able to decrypt the ciphertext which is encrypted by the system master key.At the same time our scheme can support more complex cipher policies because the attribute-sets based encryption is applied in each authority server.Furthermore our scheme can be applied into the environment with complicated user attributes,cipher policies and multi-authority center.Additional,we also propose the security model and proof it.
出处 《小型微型计算机系统》 CSCD 北大核心 2011年第12期2419-2423,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60673046 90715037)资助 高等学校博士学科点基金项目(200801410028)资助 国家"九七三"重点基础研究发展计划项目(2007CB714205)资助 重庆自然科学基金项目(2007BA2024)资助.作者
关键词 基于属性加密 多授权中心 访问控制 秘密共享 attribute-based encryption multi-authority access control secret sharing
  • 相关文献

参考文献7

  • 1Sahai A, Waters B. Fuzzy identity-based encryption[ C]. In: Eurocrypt, LNCS 3494, Springer, 2005:457-473.
  • 2Goyal V, Jain A, Pandyey O, et al. Bounded ciphertext policy at- tribute based encryption [ A ]. In: ICALP ( 2 ). LNCS 5126 [ C ], Springer Berlin,2009:579-591.
  • 3Boneh D, Franklin M. Identity-based cncryption from the weil pairing[ C]. Advances in Cryptology-Crypto,2001:213-229.
  • 4Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute- based encryption[ C]. In: IEEE Symposium on Secruity and Privacy,2007:321-334.
  • 5Bobba R, Khurana H, Prabhakaran M. Attribute-sets: a practically motivated enhancement to attribute-based eneryption [ A ]. In: Computer Security-ESORICS 2009, LNCS 5789 [ C ]. Springer Berlin ,2009:587-564.
  • 6Chase M. Multi-authority attribute based enerypfion[ C]. In: Theory of Cryptography ,LNCS1392 ,Springer Berlin ,2007:515-535.
  • 7唐强,姬东耀.多授权中心可验证的基于属性的加密方案[J].武汉大学学报(理学版),2008,54(5):607-610. 被引量:8

二级参考文献10

  • 1Shamir A. Identity-Based Cryptosystems and Signature Schemes [DB/OL]. [2007-11-03]. http://www. iseca, org/downloads/Stzamir47, pd f .
  • 2Boneh D,Franklin M. Identity-Based Encryption from the Well Pairing[J]. SIAM Journal of Computing, 2003,32:586-615.
  • 3Sahai A, Waters B. Fuzzy Identity-Based Encryption [DB/OL]. [2007-11-03]. http://www. springerlink. corn/content/kOvdgacqjq4jyypgrn/ fulltecrt, pd f.
  • 4Bonaloh J, Leieheter J. Generalized Secret Sharing and Monotone Functions [DB/OL]. [2007-11-03]. http ://cornell, edu/ courses/ cs7 5 4 / 2001f a / bena88. pdf.
  • 5Goyal V, Pandey O, Sahai A, et al. Attribute-Based Eneryption for Fine-Grained Access Control of Encrypted Data[DB/OL]. [2007-11-15]. http://portal. acre. org/ ft gateway, c fro? id= 1180418 &type= pdf&coll = GUIDE&dl : GUIDE&CFID = 371985- 78&CFTOKEN=84478665.
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext Policy Attribute-Based Encryption [DB/OL]. [2007-11-22]. http ://wzvw. cs. berkeley, edu/-bethenco/ oaklandO7- cpabe, pd f ,
  • 7Cheung L, Newport C. Provably Secure Ciphertext PolicyABE [DB/OL]. [2007-11-23]http ://people. csail, mit. edu/lcheung/papers/ccslOO-cheung, pd f.
  • 8Chase M. Multi-Authority Attribute-Based Encryption [DB/OL]. [2007-11-25]. http://www, cs. brown, edu/-mchase/ papers/multiabe, pd f .
  • 9Tang Qiang, Ji Dongyao. Verifiable Attribute Based Encryption[DB/OL]. [2007-11-20]http://eprint, iacr. org/2007/461, pdf.
  • 10Beth T,Knobloch H J,Otten M. Verifiable Secret Sha- ring for Monotone Access Structures[DB/OL]. [2007-11-05] http://www. springerlink, com/content/ prxxadggmh97gSpt/fulltext, pd f.

共引文献7

同被引文献12

  • 1Mell P, Grance T. 800-145 The NIST definition of cloud computingrS3. Gaithersburg, USA, National In- stitute of Standards and Technology, 2009.
  • 2Sahai A, Waters B. Fuzzy identity-based encryption EC//The 24th annual international conference on the theory and applications of cryptographic techniques, 2005. Aarhus, Denmark, Springer, 2005 : 457-473.
  • 3Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryptionC// IEEE symposium on security and privacy (SP' 07), 2007. Oakland, USA: IEEE Computer Society, 2007 .- 321-334.
  • 4Waters B. Ciphertext-policy attribute-based encryption [C// An expressive, efficient, and provably secure realization: The 14th International Conference on Practice and Theory in Public Key Cryptography (PKC 2011). Heidelberg, Germany. Springer, 2011. 53-70.
  • 5Yang K, Jia Xiaohua, Ren K, et al. Dac-macs: effec- tive data access control for multi-authority cloud stor- age systems[C]// IEEE INFOCOM 2013. Turin. 2013 : 2895-2903.
  • 6Jung T, Li XiangymN, Wan Zhiguo,et ak Privacy preser- ving cloud data access with multi-authorities[C]// INFOCOM 2013. Turin, IEEE, 2013: 2625-2633.
  • 7Hur J, Noh D K. Attribute-based access control with efficient revocation in data outsourcing systems [J]. IEEE Transactions on Parallel and Distributed Sys- tems, 2011, 22(7): 1214-1221.
  • 8Cheumg L, Newport C. Provably secure ciphertext policy ABE[C]// The 14th ACM conference on com- puter and communications security, 2007. New York ACM, 2007: 456-465.
  • 9Bobba R, Khurana H, Prabhakaran M. Attribute-sets.- a practically motivated enhancement to Attribute-Based encryptionECl//The 14th european symposium on re- search in computer security. France: Springer, 2009: 587-604.
  • 10Zhao J, Feng D, Zhang Z. Attribute-based conditional proxy re-eneryption with chosen-ciphertext security I-C]// Global telecommunications conference (GLO- BECOM 2010). Miami,FL: IEEE, 2010:1-6.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部