期刊文献+

一种改进的属性加密方案 被引量:2

Improved Attribute-based Encryption Scheme
在线阅读 下载PDF
导出
摘要 属性加密适合一对多的广播加密环境,很好地保护了用户的隐私,而且容易实现细粒度的访问控制。然而已有的属性加密方案中安全性假设过强、运算效率较低。通过对Waters方案的安全性假设进行分析,提出了随机参数满足一定特定关系的Eq-BDHE假设。基于该假设实现了一种改进的CP-ABE加密方案。安全分析和对比实验表明,改进方案降低了安全假设强度,在标准模型下能够抵抗选择明文攻击,同时减少了随机参数的数量,提高了运算效率。 Attribute-based encryption is suitable for one-to-many broadcast encryption environment, and is easy to im- plement fine-grained access control, protecting the user's privacy well. This paper summarized the development present situation of the attribute-based encryption. Through the analysis of the security assumption of Waters scheme, Eq-BD- HE was presented with its the random parameters satisfying certain specific relation. The improved CP-ABE encryption scheme was implemented. The security analysis and comparative experiments show that the new scheme has better secu- rity, reduces the number of system parameters, and improves the efficiency of encryption and decryption operations.
作者 宋文纳 向广利 李安康 张月欣 陶然 SONG Wen-na XIANG Guang-li LI An-kang ZHANG Yue-xin TAO Ran(School of Computer Science and Technology, Wuhan University of Technology, Wuhan 430070, Chin)
出处 《计算机科学》 CSCD 北大核心 2017年第1期167-171,193,共6页 Computer Science
关键词 属性加密 q-BDHE 线性秘密共享 Attribute-based eneryption, q-BDHE, Linear secret-sharing scheme
  • 相关文献

参考文献6

二级参考文献118

  • 1石艳荣,贺永强.PKI和基于身份加密的比较[J].微计算机信息,2008,24(3):83-84. 被引量:8
  • 2官盱玲.电子公文应用的不安全因素及对策[J].江西行政学院学报,2004,6(4):84-86. 被引量:7
  • 3杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 4Chor B,Goldwasser S,Micali S,et al.Verifiable secret sharing and achieving simultaneity in the presence of faults[A].Proceedings of 26 IEEE Symposiums on Foundations of Computer Science[C].Washington:IEEE Computer Society,1985.383-395.
  • 5Stadler M.Publicly verifiable secret sharing[A].Advances in Cryptology-EURO-CRYPT' 96[C].Berlin:Springer-Verlag,1996.32-46.
  • 6Fujisaki E,Okamoto T.A practical and provably secure scheme for publicly verifiable secret sharing and its applications[A].Advances in Cryptology-EUROCRYPT ' 98[C].Berlin:Springer-Verlag,1998.32-46.
  • 7Schoenmakers B.A simple publicly verifiable secret sharing scheme and its application to electronic voting[A].Advances in Cryptology-Crypto' 99 Proceedings[C].Berlin:Springer-Verlag,1999.148-164.
  • 8Hou Z F,Han J H,Hu D H.A new authentication scheme based on verifiable secret sharing[A].2008 International Conference on Computer Science and Software Engineering[C].Wuhan,China:IEEE Computer Society,2008.1028-1030.
  • 9Tian Y L,Peng C G,Zhang R P,et al.A practical publicly verifiable secret sharing scheme based on bilinear pairing[A].2nd International Conference on Anti-counterfeiting,Security and Identification,2008(ASID2008)[C].Guiyang,China:IEEE,2008.71-75.
  • 10Liu F,Gao D M.On the design of divisible PVSS-based electronic cash schemes[A].IEEE International Symposium on Knowledge Acquisition and Modeling Workshop(KAM Workshop 2008)[C].Wuhan China:IEEE,2008.112-115.

共引文献123

同被引文献10

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部