期刊文献+

改进的属性撤销权重属性基加密方案 被引量:2

Improved weighted attribute-based encryption scheme with revocation
在线阅读 下载PDF
导出
摘要 在PHR(Personal Health Records,个人健康记录)系统中,用户会动态地加入或离开,及时撤销细粒度的属性更加适用于实际应用系统。为此,提出一种改进的基于仲裁者的密文策略的属性基加密方案,使其能够在具有外包解密的同时可以实现细粒度属性及时撤销。该方案通过构造KEK树及时更新密钥和密文以此来及时撤销细粒度属性。此外,针对现有的密文策略属性基加密方案较少考虑到属性重要性,将属性权重的概念引入该方案中,使其更加适合PHR系统。安全性分析和仿真实验表明,与已有方案相比,所提方案可以抵抗合谋攻击,保证数据机密性以及前向安全和后向安全。此外,该方案具有更低的计算复杂度。 The users may dynamically enter or leave the Personal Health Record(PHR)system, so the realtime finegrained attributes revocation is required and is more suitable for practical applications. In this paper, an improved weighted attribute-based encryption scheme with revocation is proposed. The proposed scheme not only has the function of out sourcing decryption, but also does fine-grained attributes revocation in time. By constructing the KEK tree, the proposed scheme updates key and cipher text timely to achieve fine-grained attributes revocation. In addition, based on the fact that the importance of the attributes is not considered in existing policy attributes ciphertext encryption schemes, the concept of weight attribute is adopted in the proposed scheme to make it more suitable for the PHR system. The security analysis and experimental results indicate that, compared with existing CP-ABE schemes, the proposed scheme resists the conspiracy attack, ensures the confidentiality of data, and guarantees the forward and backward security. In addition, the computational complexity of the propopsed scheme is decreased.
出处 《计算机工程与应用》 CSCD 北大核心 2018年第3期82-86,共5页 Computer Engineering and Applications
基金 江苏省网络监控工程中心2015年开放课题(No.KJR1505) 上海市信息安全综合管理技术研究重点实验室(No.AGK201603)
关键词 个人健康记录(PHR)系统 属性撤销 属性权重 属性基加密 Personal Health Records(PHR)system attribute revocation weighted attribute attribute-based encryption
  • 相关文献

参考文献1

二级参考文献14

  • 1ARMBRUST M, FOX A, GRIFFITH R, et al. A view of cloud computing [J]. Communications of the ACM, 2010,53(4):50 58.
  • 2SAHAI A, WATERS B. Fuzzy identity-based encryp tion [M]//LNCS: Volume 3494 Advances in Cryp tology-EUROCRYPT 2005. Berlin, Germany:Spring- er Verlag, 2005:557-557.
  • 3BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing [M]//LNCS: Volume 2139 Advances in Cryptology-CRYPTO 2001. Berlin, Ger many: Springer-Verlag, 2001:213 229.
  • 4BONEH D, BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles M] //LNCS: Volume 3027 Advances in Cryptology-EU ROCRYPT 2004. Berlin, Germany: Springer-Verlag, 2004:223-238.
  • 5BONEH D, BOYEN X. Secure identity based encryp- tion without random oracles [M] // LNCS: Volume 3152 Advances in CryptologyCRYPTO 2004. Ber- lin, Germany: Springer-Verlag, 2004:443-459.
  • 6WATERS B. Efficient identity-based encryption with- out random oracles [M] // LNCS.. Volume 3494 Ad- vances in CryptologyEUROCRYPT 2005. Berlin, Germany: Springer-Verlag, 2005:557 557.
  • 7GOYAL V, PANDEY O, SAHAI A, et al. Attrib- ute-based encryption for fine-grained access control of encrypted data [C // Proceedings of the 13th ACM Conference on Computer and Communications Securi- ty. New York, NY, USA: ACM, 2006:89-98.
  • 8CHEUNG L, NEWPORT C. Provably secure cipher- text policy ABE [-C // Proceedings of the 14th ACM Conference on Computer and Communications Securi- ty. New York, NY, USA: ACM, 2007:456-465.
  • 9BETHENCOURT J, SAHAI A, WATERS B. Ci- phertext-policy attribute-based encryption [-C//IEEE Symposium on Security and Privacy. Washington, DC, USA.. IEEE Computer Society, 2007:321 334.
  • 10WATERS B. Ciphertext-policy attribute-based encryp tion: an expressive, efficient, and provably secure re-alization [ M] // LNCS: Cryptography PKC 2011 Verlag, 2011 ..53-70.

共引文献16

同被引文献9

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部