期刊文献+

素数阶群上可追踪并撤销叛徒的ABE方案

Attribute-based encryption scheme for traitor tracing and revocation together on prime order groups
在线阅读 下载PDF
导出
摘要 叛徒追踪和撤销是属性基加密(ABE)需要解决的问题。目前满足自适应安全且可追踪并撤销叛徒的ABE方案(ABTR)在合数阶群上构造。针对合数阶群上双线性配对计算开销过大的问题,首先利用对偶向量空间技术,提出了一个素数阶群上具有扩展通配符的ABE方案(PGWABE);然后以对偶系统加密为基础,通过构建一系列两两不可区分的攻击游戏证明了该方案是自适应安全的;最后利用完全子树构架,将PGWABE方案转变为素数阶群上可追踪并撤销叛徒的ABE方案(PABTR)。性能分析表明,与ABTR方案相比,PABTR方案在同等安全性上效率更高。 Traitor tracing and revocation is crucial to the use of attribute-based encryption( A B E ) . The previous adaptively secureABE schem e for traitor tracing and revocation together ( ABTR) suffered from superfluous computation overhead in that itwas designed on composite order groups. To tackle this problem , this paper proposed an ABE schem e with generalized wildcardson prime order groups (PG W A B E ) while applying dual pairing vector space approach,and proved the proposed schemeadaptively secure on the basis of dual system encryption along with a sequence of attacking games which was indistinguishablefrom each other. Furthermore, with the aid of complete subtree, this paper transformed PGWABE into an attribute-based encryptionschem e for traitor tracing and revocation together on prime order groups ( PABTR) . Performance analysis indicatesthat compared with ABTR schem e, PABTR schem e is more efficient on an equivalent security level.
作者 李作辉 陈性元 Li Zuohui;Chen Xingyuan(Institute of Security Engineering, Information Engineering University, Zhengzhou 450001 , China)
出处 《计算机应用研究》 CSCD 北大核心 2016年第10期3088-3093,共6页 Application Research of Computers
基金 国家"973"计划资助项目(2011CB311801)
关键词 属性基加密 叛徒追踪 撤销 完全子树 素数阶 对偶系统加密 attribute-based encryption traitor tracing revocation complete subtree prime order dual system encryption
  • 相关文献

参考文献2

二级参考文献22

  • 1Sahai A, Waters B. Fuzzy identity based encryption//Pro- ceedings of the EUROCRYPT 2005. Aarhus, Denmark, 2005 : 457-473.
  • 2Goyal V, Pandey O, Sahai A, Waters B. Attribute-based en- cryption for fine-grained access control of encrypted data//Pro ceedings of the 13th ACM Conference on Computer and Com- munication Security. Alexandria, VA, USA, 2006:89-98.
  • 3Betheneourt J, Sahai A, Waters B. Ciphertext-policy attrib- ute-based encryption//Proceedings of the 2007 IEEE Sympo- sium on Security and Privacy. Washington, USA, 2007: 321-334.
  • 4Traynor P, Butler K, Enck W, Mcdaniel P. Realizing mas sive-scale conditional access systems through attribute-based cryptosystems//Proceedings of the 15th NDSS 2008. San Diego, USENIX Association, 2008:1-13.
  • 5Yu S C, Ren K, Lou W J. Attribute-based content distribu tion with hidden policy//Proceedings of the 4th Workshop on Secure Network Protocols. Orlando, 2008: 39-44.
  • 6Lewko A, Okarnoto T, Sahai A, Takashima K, Waters B. Fully secure functional encryption: Attribute-based encryp- tion and (hierarchical) inner product encryption//Proceed ings of the EUROCRYPT 2010. Monaco, 2010: 62-91.
  • 7Hinek M J, Jiang S, Safavi-Naini R, Shahandashti S F. Attribute-based encryption with key cloning protection. Cryptology ePrint Archive: Report 2008/478, 2008.
  • 8Yu S C, Ren K, Lou W J, Li J. Defending against key abuse attacks in KP ABE enabled broadcast system//Proceedings of the Security and Privacy in Communication Networks. Athens, Greece, 2009:311-329.
  • 9Li J, Ren K, Zhu B, Wan Z G. Privacy aware attribute- based encryption with user accountability//Proceedings of the Information Security Conference :?009. 2009:347-362.
  • 10Wang Y T, Chen K F, Chen J H. Attribute based traitor tracing. Journal of Information Science and Engineering, 2011, 27(1): 181-195.

共引文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部