期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
A Generic Construction of Ciphertext-Policy Attribute- Based Encryption Supporting Attribute Revocation 被引量:7
1
作者 WU Qiuxin 《China Communications》 SCIE CSCD 2014年第A01期93-100,共8页
Attribute-based encryption is drawing more attention with its inherent attractive properties which are potential to be widely used in the newly developing cloud computing. However, one of the main obstacles for its ap... Attribute-based encryption is drawing more attention with its inherent attractive properties which are potential to be widely used in the newly developing cloud computing. However, one of the main obstacles for its application is how to revoke the attributes of the users, though some ABE schemes have realized revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or attribute revocation under the indirect revocation model such that all the users' private keys will be affected by the revocation. In this paper, we define the model of CP-ABE supporting the attribute revocation under the direct revocation model, in which the revocation list is embed in the ciphertext and none of the users' private keys will be affected by the revocation process. Then we propose a generic construction, and prove its security with the decision q-BDHE assumption. 展开更多
关键词 attribute revocation attribute based encryption ciphertext-Policy generic construction.
在线阅读 下载PDF
Generic attribute revocation systems for attribute-based encryption in cloud storage 被引量:2
2
作者 Genlang CHEN Zhiqian XU +3 位作者 Jia-jian ZHANG Guo-jun WANG Hai JIANG Miao-qing HUANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第6期773-786,共14页
Attribute-based encryption(ABE)has been a preferred encryption technology to solve the problems of data protection and access control,especially when the cloud storage is provided by third-party service providers.ABE ... Attribute-based encryption(ABE)has been a preferred encryption technology to solve the problems of data protection and access control,especially when the cloud storage is provided by third-party service providers.ABE can put data access under control at each data item level.However,ABE schemes have practical limitations on dynamic attribute revocation.We propose a generic attribute revocation system for ABE with user privacy protection.The attribute revocation ABE(AR-ABE)system can work with any type of ABE scheme to dynamically revoke any number of attributes. 展开更多
关键词 attribute-based encryption Generic attribute revocation User privacy Cloud storage Access control
原文传递
Access control scheme with attribute revocation for SWIM 被引量:1
3
作者 Wu Zhijun Cui Zihan +1 位作者 Wang Caiyun Lei Jin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2017年第6期49-54,共6页
Access control scheme is proposed for System Wide Information Management (SWIM) to address the problem of attribute revocation in practical applications. Based on the attribute based encryption (ABE), this scheme ... Access control scheme is proposed for System Wide Information Management (SWIM) to address the problem of attribute revocation in practical applications. Based on the attribute based encryption (ABE), this scheme introduces the proxy re-encryption mechanism and key encrypting key (KEK) tree to realize fine-grained access control with attribute revocation. This paper defines the attributes according to the status quo of civil aviation. Compared with some other schemes proposed before, this scheme not only shortens the length of ciphertext (CT) and private key but also improves the efficiency of encryption and decryption. The scheme can resist collusion attacks and ensure the security of data in SWIM. 展开更多
关键词 SWIM access control proxy re-encryption attribute revocation
原文传递
Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing 被引量:16
4
作者 CHEN Yanli SONG Lingling YANG Geng 《China Communications》 SCIE CSCD 2016年第2期146-162,共17页
In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption an... In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations. 展开更多
关键词 cloud computing attribute-basedencryption access control multi-authority constant ciphertext length attribute revocation
在线阅读 下载PDF
Novel dynamic anti-collusion ciphertext policy attribute-based encryption scheme in 5G D2D environment
5
作者 Xu Xiangjie Jiang Rui 《Journal of Southeast University(English Edition)》 EI CAS 2021年第3期251-257,共7页
To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption... To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE)scheme in the 5G D2D environment is proposed.On the basis of the ciphertext policy attribute-based encryption algorithm,fine-grained access control and secure attribute revocation are realized,and the confidentiality of data is guaranteed.A polynomial function is adopted in the ciphertext generation phase to realize dynamic user management.A random number is used to prevent a collusion attack among the legitimate user equipment(UE),revoked UE,and external network attackers.Finally,on the basis of the Diffie-Hellman problem,the NDA-CP-ABE scheme is formally proved,and the simulation performances are compared with those of similar schemes.The results show that data can be securely shared through a D2D channel with secure attribute revocation,anti-collusion,and dynamic user management.Moreover,compared with similar schemes,the NDA-CP-ABE scheme has higher efficiency in encryption,decryption,and storage. 展开更多
关键词 device-to-device(D2D) attribute revocation user management dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE) access control
在线阅读 下载PDF
Trusted access control mechanism for data with blockchain-assisted attribute encryption
6
作者 Chang Liu Dong Wang +3 位作者 Da Li Shaoyong Guo Wenjing Li Xuesong Qiu 《High-Confidence Computing》 2025年第2期19-30,共12页
In the growing demand for data sharing,how to realize fine-grained trusted access control of shared data and protect data security has become a difficult problem.Ciphertext policy attribute-based encryption(CP-ABE)mod... In the growing demand for data sharing,how to realize fine-grained trusted access control of shared data and protect data security has become a difficult problem.Ciphertext policy attribute-based encryption(CP-ABE)model is widely used in cloud data sharing scenarios,but there are problems such as privacy leakage of access policy,irrevocability of user or attribute,key escrow,and trust bottleneck.Therefore,we propose a blockchain-assisted CP-ABE(B-CP-ABE)mechanism for trusted data access control.Firstly,we construct a data trusted access control architecture based on the B-CP-ABE,which realizes the automated execution of access policies through smart contracts and guarantees the trusted access process through blockchain.Then,we define the B-CP-ABE scheme,which has the functions of policy partial hidden,attribute revocation,and anti-key escrow.The B-CP-ABE scheme utilizes Bloom filter to hide the mapping relationship of sensitive attributes in the access structure,realizes flexible revocation and recovery of users and attributes by re-encryption algorithm,and solves the key escrow problem by joint authorization of data owners and attribute authority.Finally,we demonstrate the usability of the B-CP-ABE scheme by performing security analysis and performance analysis. 展开更多
关键词 Access control Blockchain CP-ABE Policy hidden attribute revocation Key escrow
在线阅读 下载PDF
Improving Security and Sharing in Online Social Efficiency for Encrypted Data Networks 被引量:2
7
作者 HUANG Qinlong MA Zhaofeng +2 位作者 YANG Yixian NIU Xinxin FU Jingyi 《China Communications》 SCIE CSCD 2014年第3期104-117,共14页
Despite that existing data sharing systems in online social networks(OSNs)propose to encrypt data before sharing,the multiparty access control of encrypted data has become a challenging issue.In this paper,we propose ... Despite that existing data sharing systems in online social networks(OSNs)propose to encrypt data before sharing,the multiparty access control of encrypted data has become a challenging issue.In this paper,we propose a secure data sharing scheme in 0SNs based on ciphertext-policy attribute-based proxy re-encryption and secret sharing.In order to protect users'sensitive data,our scheme allows users to customize access policies of their data and then outsource encrypted data to the OSNs service provider.Our scheme presents a multiparty access control model,which enables the disseminator to update the access policy of ciphertext if their attributes satisfy the existing access policy.Further,we present a partial decryption construction in which the computation overhead of user is largely reduced by delegating most of the decryption operations to the OSNs service provider.We also provide checkability on the results returned from the OSNs service provider to guarantee the correctness of partial decrypted ciphertext.Moreover,our scheme presents an efficient attribute revocation method that achieves both forward and backward secrecy.The security and performance analysis results indicate that the proposed scheme is secure and efficient in OSNs. 展开更多
关键词 data sharing online socialnetworks multiparty access control attribute-based encryption attribute revocation
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部