期刊文献+
共找到726篇文章
< 1 2 37 >
每页显示 20 50 100
A Generic Construction of Ciphertext-Policy Attribute- Based Encryption Supporting Attribute Revocation 被引量:7
1
作者 WU Qiuxin 《China Communications》 SCIE CSCD 2014年第A01期93-100,共8页
Attribute-based encryption is drawing more attention with its inherent attractive properties which are potential to be widely used in the newly developing cloud computing. However, one of the main obstacles for its ap... Attribute-based encryption is drawing more attention with its inherent attractive properties which are potential to be widely used in the newly developing cloud computing. However, one of the main obstacles for its application is how to revoke the attributes of the users, though some ABE schemes have realized revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or attribute revocation under the indirect revocation model such that all the users' private keys will be affected by the revocation. In this paper, we define the model of CP-ABE supporting the attribute revocation under the direct revocation model, in which the revocation list is embed in the ciphertext and none of the users' private keys will be affected by the revocation process. Then we propose a generic construction, and prove its security with the decision q-BDHE assumption. 展开更多
关键词 attribute revocation attribute based encryption ciphertext-Policy generic construction.
在线阅读 下载PDF
Fully Secure Revocable Attribute-Based Encryption 被引量:3
2
作者 钱俊磊 董晓蕾 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期490-496,共7页
Distributed information systems require complex access control which depends upon attributes of protected data and access policies.Traditionally,to enforce the access control,a file server is used to store all data an... Distributed information systems require complex access control which depends upon attributes of protected data and access policies.Traditionally,to enforce the access control,a file server is used to store all data and act as a reference to check the user.Apparently,the drawback of this system is that the security is based on the file server and the data are stored in plaintext.Attribute-based encryption(ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users’ attributes. According to this mechanism,even though the file server is compromised,we can still keep the security of the data. Besides the access control,user may be deprived of the ability in some situation,for example paying TV.More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters.And few of previous ABE constructions realize revocation of the users’ key.This paper presents an ABE scheme that supports revocation and has full security in adaptive model.We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security. 展开更多
关键词 attribute-based encryption(abe) dual encryption REVOCATION
原文传递
Attribute-Based Re-Encryption Scheme in the Standard Model 被引量:4
3
作者 GUO Shanqing ZENG Yingpei +1 位作者 WEI Juan XU Qiuliang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期621-625,共5页
In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext unde... In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme. 展开更多
关键词 attribute-based re-encryption scheme standard model network storage
在线阅读 下载PDF
A Hierarchical Attribute-Based Encryption Scheme 被引量:2
4
作者 ZOU Xiubin 《Wuhan University Journal of Natural Sciences》 CAS 2013年第3期259-264,共6页
According to the relation of an attribute set and its subset,the author presents a hierarchical attribute-based encryption scheme in which a secret key is associated with an attribute set.A user can delegate the priva... According to the relation of an attribute set and its subset,the author presents a hierarchical attribute-based encryption scheme in which a secret key is associated with an attribute set.A user can delegate the private key corresponding to any subset of an attribute set while he has the private key corresponding to the attribute set.Moreover,the size of the ciphertext is constant,but the size of private key is linear with the order of the attribute set in the hierarchical attribute-based encryption scheme.Lastly,we can also prove that this encryption scheme meets the security of IND-sSETCPA in the standard model. 展开更多
关键词 attribute-based encryption hierarchical attributebased encryption identity-based encryption(IBE) bilinear map
原文传递
属性分级并部分盲化的多机构CP-ABE
5
作者 王娟 古丽博斯坦·阿克木 +1 位作者 雷雪娇 努尔买买提·黑力力 《计算机应用与软件》 北大核心 2026年第2期347-355,370,共10页
针对CP-ABE的访问策略中有些属性可能会泄露一些隐私或敏感信息,提出盲化敏感属性的多属性监管机构CP-ABE方案。该方案根据属性和敏感信息之间的相关程度将属性分成三类:全局敏感、局部敏感和一般。加密时盲化访问策略中出现敏感属性,... 针对CP-ABE的访问策略中有些属性可能会泄露一些隐私或敏感信息,提出盲化敏感属性的多属性监管机构CP-ABE方案。该方案根据属性和敏感信息之间的相关程度将属性分成三类:全局敏感、局部敏感和一般。加密时盲化访问策略中出现敏感属性,而一般属性以明文形式出现。两个属性监管机构协调预判用户的解密能力,进而避免徒劳的解密运算。这样不仅能针对性地防止访问策略泄露敏感信息,而且通过保留一般属性的明文出现,能降低加解密的计算代价,从而得到策略机密性和密码系统的效率之间的更好折中。 展开更多
关键词 密文策略属性基加密 多授权机构 属性分类 全局敏感属性 局部敏感属性
在线阅读 下载PDF
Ciphertext-Policy Attribute-Based Encryption for General Circuits from Bilinear Maps 被引量:2
6
作者 HU Peng GAO Haiying 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期171-177,共7页
In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on bilinear maps which is more suitable for practical use and more efficien... In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on bilinear maps which is more suitable for practical use and more efficient than multilinear maps. Our scheme uses a top-down secret sharing and FANOUT gate to resist the "backtracking attack" which is the main barrier expending access tree to general circuit. In the standard model, selective security of our scheme is proved. Comparing with current scheme for general circuits from bilinear maps, our work is more efficient. 展开更多
关键词 ciphertext-policy attribute-based encryption general circuits bilinear maps selective security
原文传递
Multi-authority proxy re-encryption based on CPABE for cloud storage systems 被引量:7
7
作者 Xiaolong Xu Jinglan Zhou +1 位作者 Xinheng Wang Yun Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期211-223,共13页
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ... The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH). 展开更多
关键词 cloud storage data partition multi-authority security proxy re-encryption attribute-based encryptionabe).
在线阅读 下载PDF
基于区块链与CP-ABE的可验证分布式密钥生成协议 被引量:1
8
作者 彭长根 龙洋洋 陈玉玲 《计算机学报》 北大核心 2025年第6期1342-1355,共14页
分布式密钥生成(DKG)协议作为一种重要的密码学工具,它允许多个参与者共同协作生成一对额外的公私钥,而无需任何一方完全了解密钥的完整信息。由于DKG协议中的每个参与者仅持有其自身密钥份额,完整的密钥只有通过多个参与者协作时才能... 分布式密钥生成(DKG)协议作为一种重要的密码学工具,它允许多个参与者共同协作生成一对额外的公私钥,而无需任何一方完全了解密钥的完整信息。由于DKG协议中的每个参与者仅持有其自身密钥份额,完整的密钥只有通过多个参与者协作时才能被重构出来,DKG协议能有效降低密钥泄露的风险。然而,现有分布式密钥生成(DKG)协议大多基于公开可验证秘密共享(PVSS)方案进行设计,协议的共享阶段和重构阶段至少各需要两轮交互,DKG协议的计算复杂度和通信复杂度较高,通常为O(n^(2)),这在大规模分布式系统中可能成为性能瓶颈。密文策略属性加密(CP-ABE)因其支持密文从外部解密的特性备受关注,且区块链技术的兴起为DKG协议的安全性和透明性提供了新的解决方案。本文利用区块链作为公开信道、CP-ABE作为密码原语,提出基于区块链的一轮可验证DKG协议,旨在通过结合区块链技术和CP-ABE来优化传统DKG协议的性能和安全性。该协议仅需一轮交互即可完成密钥共享和重构。具体来说,该协议利用区块链作为公开信道,确保密钥生成过程的透明性和可追溯性,同时借助CP-ABE的特性,确保外部用户能对重构的密钥进行验证。在密文共享阶段,协议引入了通用哈希承诺机制,通过将承诺种子作为输入对CP-ABE的加密算法进行改进。同时,协议利用智能合约对DKG协议的子公钥进行有效性检查,验证复杂度为O(1)。在重构阶段,外部用户可通过智能合约获取参与节点提交的密钥份额密文和DKG协议子公钥,仅需O(n)的计算复杂度和通信复杂度,就能重构协议主私钥。安全性分析及实验分析表明,所提DKG协议需较低的计算、通信开销,且满足可验证性、有效性、保密性及鲁棒性等安全属性。 展开更多
关键词 分布式密钥生成 属性加密 区块链 密钥管理 承诺
在线阅读 下载PDF
Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
9
作者 S.Saravanakumar S.Chitra 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期985-996,共12页
Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracti... Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracting usersto outsource data in the cloud. However, users outsource data directly via cloudstage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographicsolution in a cloud environment, and can be drawn up for access control by dataowners (DO) to define access policy. Unfortunately, an outsourced architectureapplied with attribute-based encryption introduces numerous challenges, including revocation. This issue is a threat to the data security of DO. Furthermore,highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes(revocation) storage identity-based encryption. Result is evaluated using Cloudsim, and our algorithm outperforms in terms of computational cost by consuming32 MB for 150-MB files. 展开更多
关键词 Cloud computing storage identification based revocation attribute based access control encryption DECRYPTION
在线阅读 下载PDF
Enabling Privacy Preservation and Decentralization for Attribute-Based Task Assignment in Crowdsourcing
10
作者 Tianqing Liang 《Journal of Computer and Communications》 2020年第4期81-100,共20页
Crowdsourcing allows people who are endowed with certain skills to accomplish special tasks with incentive. Despite the state-of-art crowdsourcing schemes have guaranteed low overhead and considerable quality, most of... Crowdsourcing allows people who are endowed with certain skills to accomplish special tasks with incentive. Despite the state-of-art crowdsourcing schemes have guaranteed low overhead and considerable quality, most of them expose task content and user’s attribute information to a centralized server. These servers are vulnerable to single points of failure, the leakage of user’s privacy information, and lacking of transparency. We therefore explored an alternative design for task assignment based on the emerging decentralized blockchain technology. While enabling the advantages of the public blockchain, changing to open operations requires some additional technology and design to preserve the privacy of user’s information. To mitigate this issue, we proposed a secure task assignment scheme, which enables task content preservation and anonymous attribute requirement checking. Specifically, by adopting the cryptographic techniques, the proposed scheme enables task requester to safely place his task in a transparent blockchain. Furthermore, the proposed scheme divides the attribute verification process into public pre-verification and requester verification, so that the requester can check only the identity of the worker, instead of verifying the attributes one by one, thereby preserving the identity of worker while significantly reducing the requester’s calculation burden. Additionally, security analysis demonstrated unrelated entities cannot learn about the task content and identity information from all data uploaded by requester and worker. Performance evaluation showed the low computational overhead of our scheme. 展开更多
关键词 Crowdsourcing TASK ASSIGNMENT attribute-based encryption Blockchain Smart CONTRACT
在线阅读 下载PDF
格上支持策略分割和属性撤销的CP-ABE方案
11
作者 何苗 努尔买买提·黑力力 《信息安全研究》 北大核心 2025年第6期548-560,共13页
密文策略属性基加密(ciphertext-policy attribute-based encryption,CP-ABE)适合在云存储系统中提供数据的安全共享服务.然而,CP-ABE中属性撤销是一个棘手的问题.随着量子计算机的发展,传统的CP-ABE不再安全,基于格的CP-ABE能够抵抗量... 密文策略属性基加密(ciphertext-policy attribute-based encryption,CP-ABE)适合在云存储系统中提供数据的安全共享服务.然而,CP-ABE中属性撤销是一个棘手的问题.随着量子计算机的发展,传统的CP-ABE不再安全,基于格的CP-ABE能够抵抗量子攻击.提出一种格上支持策略分割和属性撤销的CP-ABE方案.该方案能够抵抗量子攻击,提供细粒度的访问控制和即时属性撤销.在属性撤销发生时,利用策略分割减少受影响的密文(块),并且通过密文更新方法减少密文更新的范围以及次数.理论分析表明该方案的计算开销在可控制的范围内.最后,在标准模型下证明了该方案是选择明文安全(IND-CPA)的,并且其安全性可以归结于环上容错学习(ring learning with errors,RLWE)的困难性问题中. 展开更多
关键词 格密码 密文策略属性基加密 属性撤销 策略分割 环上容错学习
在线阅读 下载PDF
Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing
12
作者 Asma Alotaibi Ahmed Barnawi Mohammed Buhari 《Journal of Information Security》 2017年第3期203-222,共20页
Fog computing is a concept that extends the paradigm of cloud computing to the network edge. The goal of fog computing is to situate resources in the vicinity of end users. As with cloud computing, fog computing provi... Fog computing is a concept that extends the paradigm of cloud computing to the network edge. The goal of fog computing is to situate resources in the vicinity of end users. As with cloud computing, fog computing provides storage services. The data owners can store their confidential data in many fog nodes, which could cause more challenges for data sharing security. In this paper, we present a novel architecture for data sharing in a fog environment. We explore the benefits of fog computing in addressing one-to-many data sharing applications. This architecture sought to outperform the cloud-based architecture and to ensure further enhancements to system performance, especially from the perspective of security. We will address the security challenges of data sharing, such as fine-grained access control, data confidentiality, collusion resistance, scalability, and the issue of user revocation. Keeping these issues in mind, we will secure data sharing in fog computing by combining attributebased encryption and proxy re-encryption techniques. Findings of this study indicate that our system has the response and processing time faster than classical cloud systems. Further, experimental results show that our system has an efficient user revocation mechanism, and that it provides high scalability and sharing of data in real time with low latency. 展开更多
关键词 attribute-based encryption FINE-GRAINED Access Control FOG COMPUTING PROXY Re-encryption User REVOCATION
在线阅读 下载PDF
基于智能合约和CP-ABE的病理信息可追溯安全共享方案
13
作者 童心悦 陈付龙 +2 位作者 王涛春 谢冬 胡鹏 《网络空间安全科学学报》 2025年第3期102-116,共15页
随着远程医疗的广泛应用,病理信息中包含的患者个人隐私面临严峻威胁。传统的安全共享算法往往侧重构建复杂的访问模型或加密算法,却在泄密者身份追踪方面存在明显缺陷,无法有效应对数据泄露问题。为解决这一难题,提出了一种基于白盒追... 随着远程医疗的广泛应用,病理信息中包含的患者个人隐私面临严峻威胁。传统的安全共享算法往往侧重构建复杂的访问模型或加密算法,却在泄密者身份追踪方面存在明显缺陷,无法有效应对数据泄露问题。为解决这一难题,提出了一种基于白盒追踪和智能合约实现数据可溯共享的方案。该方案的核心在于为每位用户分配唯一的ID,并将ID与用户属性组进行编码生成密钥,确保只有符合特定访问结构的用户才能访问病理信息数据。每当用户进行访问操作时,智能合约会自动记录访问者的密钥,为后续的数据安全审计和泄密追踪提供了重要依据。一旦发生数据泄露事件,管理员可以通过访问者密钥进行反解密获取用户ID,从而定位泄密者的身份。理论分析和实验表明,该方案拥有较高的灵活性和安全性,并通过引入解密外包服务,减少了传统访问控制方案的加解密时间损耗。 展开更多
关键词 访问控制 属性加密 智能合约 白盒追踪 解密外包
在线阅读 下载PDF
TTRC-ABE:可追踪可撤销的基于循环代数带误差学习问题的格基属性加密方案 被引量:1
14
作者 刘媛 王励成 周永彬 《电子与信息学报》 北大核心 2025年第6期1911-1926,共16页
格基属性加密方案兼具了格密码抵抗量子计算攻击的优势和属性基加密细粒度访问控制灵活授权的优势,是格密码研究的热点。已有的基于带误差学习问题/环上带误差学习问题(LWE/RLWE)的格基属性加密方案存在不支持叛逆者追踪与撤销的问题,... 格基属性加密方案兼具了格密码抵抗量子计算攻击的优势和属性基加密细粒度访问控制灵活授权的优势,是格密码研究的热点。已有的基于带误差学习问题/环上带误差学习问题(LWE/RLWE)的格基属性加密方案存在不支持叛逆者追踪与撤销的问题,即当解密密钥泄露时,无法准确确认用户的身份并及时撤销该叛逆用户,此外,访问策略中的属性可能会暴露敏感信息,需要对用户属性隐私进行保护。针对上述问题,该文基于2022年国际密码学顶刊(JoC)上提出的循环代数LWE(CLWE)问题,提出一种支持叛逆用户追踪与撤销,并同时保护属性隐私的格基属性加密方案。该方案通过将用户唯一身份信息全局标识(GID)与完全二叉树的叶子节点值绑定,并根据解密密钥中的GID跟踪恶意用户,进而通过更新撤销列表和密文,实现叛逆者的追踪和撤销;另外,通过利用2维(属性标签,属性值)属性结构代替传统的1维(属性值)属性结构,并结合半访问策略结构和循环代数上的扩展型Shamir门限秘密共享方案,对用户的属性值进行隐藏,进而防止用户属性隐私泄露;最后,该方案在标准模型中被证明是安全的。性能分析表明,与其他相关格基属性加密方案相比,该方案的系统公钥尺寸、密文尺寸、平均意义下的密文膨胀率较小,且支持叛逆者的追踪撤销和属性隐私保护。 展开更多
关键词 循环代数带误差学习问题 属性基加密 叛逆者追踪 叛逆者撤销 隐私保护
在线阅读 下载PDF
基于CP-ABE算法的移动网络数据访问安全控制方法
15
作者 唐华 张磊 《计算机仿真》 2025年第12期377-380,390,共5页
移动网络安全保护中,数据加密通常仅针对原始数据内容,未将权限相关的属性与数据加密过程深度融合,使得访问者能够绕过正常的权限验证机制获取不当的数据访问权限。针对上述问题,为了提升移动网络数据的安全性,提出一种基于密文策略-属... 移动网络安全保护中,数据加密通常仅针对原始数据内容,未将权限相关的属性与数据加密过程深度融合,使得访问者能够绕过正常的权限验证机制获取不当的数据访问权限。针对上述问题,为了提升移动网络数据的安全性,提出一种基于密文策略-属性基加密(Ciphertext-Policy Attribute-Based Encryption,CP-ABE)算法的移动网络数据访问安全控制方法。首先,通过节点管理器建立移动网络在线节点列表,将其发送给源节点,利用源节点利获取数据传输路径;其次,初步加密处理移动网络数据,并将密文沿着路径上传至服务器;最后,为了进一步增加数据的安全性,利用CP-ABE加密算法,融合数据加密与权限认证过程,根据预设的密文策略和用户属性来分析用户的身份。只有当用户属性完全符合密文所规定的访问权限结构时,用户才能够解密密文内容,以此来实现对移动网络数据访问过程的安全控制。仿真结果表明:所提方法能够实现精确的访问控制,有效提升移动网络数据的安全性。 展开更多
关键词 密文策略-属性基加密算法 移动网络数据 访问安全控制 数据加密 访问权限
在线阅读 下载PDF
Blockchain-Based Framework for Secure Sharing of Cross-Border Trade Data
16
作者 Shenjian Xiao Xiaoli Qin +1 位作者 Yanzhao Tian Zhongkai Dang 《Computers, Materials & Continua》 2025年第5期2351-2373,共23页
The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,inclu... The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,including enterprises,agents,and government departments.However,the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes.In addressing this need,this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption(MA-ABE)in combination with blockchain technology.This scheme supports proxy decryption,attribute revocation,and policy update,while allowing each participating entity to manage their keys autonomously,ensuring system security and enhancing trust among participants.In order to enhance system decentralization,a mechanism has been designed in the architecture where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters.Integration with the multi-party process execution engine Caterpillar has been shown to boost the transparency of cross-border information flow and cooperation between different organizations.The scheme ensures the auditability of data access control information and the visualization of on-chain data sharing.The MA-ABE scheme is statically secure under the q-Decisional Parallel Bilinear Diffie-Hellman Exponent(q-DPBDHE2)assumption in the random oracle model,and can resist ciphertext rollback attacks to achieve true backward and forward security.Theoretical analysis and experimental results demonstrate the appropriateness of the scheme for cross-border data collaboration between different institutions. 展开更多
关键词 Multi-authority attribute based encryption blockchain data sharing access control
在线阅读 下载PDF
基于CP-ABE结合非对称加密算法的云计算资源分级访问控制
17
作者 赵琳莹 王超 《吉林大学学报(信息科学版)》 2025年第5期1101-1110,共10页
针对云计算环境中存在多租户、多级安全需求等复杂场景,现有访问控制策略难以满足不同用户和应用的需求,导致资源访问安全性较低,且加解密时消耗时间较长的问题,将密文策略的属性基加密(CP-ABE:Ciphertext-Policy Atlribute-Based Encry... 针对云计算环境中存在多租户、多级安全需求等复杂场景,现有访问控制策略难以满足不同用户和应用的需求,导致资源访问安全性较低,且加解密时消耗时间较长的问题,将密文策略的属性基加密(CP-ABE:Ciphertext-Policy Atlribute-Based Encryption)与非对称加密(RSA:Rivest-Shamir-Adleman)相结合,对云计算资源分级访问控制进行了研究。建立CP-ABE访问控制架构,并制定加密访问策略。在上述内容支持下,利用云计算资源分级访问相关信任值明确访问信任关系,获得访问主体与客体资源的信任度。结合计算所得信任值对用户进行分级授权,以满足多租户、多级安全需求。最后根据用户身份分级授权的结果,采用RSA算法替代CP-ABE复杂的双线性映射进行加解密,实现资源分级访问精准控制,降低加解密时间消耗。实验测试结果表明,所提方法并发连接数可达400,分级访问过度授权率最大值为6.8%,且访问控制响应时间可有效控制在6 s以内,能有效满足多租户、多级安全需求应用场景,具有较好的云计算资源分级访问控制效果。 展开更多
关键词 改进属性基加密 云计算 访问精准控制 信任度 分级授权
在线阅读 下载PDF
基于区块链的分层属性基可搜索加密方案
18
作者 高改梅 张爱贞 +3 位作者 刘春霞 杨玉丽 党伟超 杜苗莲 《计算机工程与设计》 北大核心 2026年第2期442-451,共10页
针对分层属性基加密算法的用户权限越界问题以及搜索权限上的局限性,提出基于区块链的分层属性基可搜索加密方案。在分层访问树的基础上,修改密文项设计分层属性基加密算法。基于非对称可搜索加密构造用户陷门及搜索算法,以实现用户对... 针对分层属性基加密算法的用户权限越界问题以及搜索权限上的局限性,提出基于区块链的分层属性基可搜索加密方案。在分层访问树的基础上,修改密文项设计分层属性基加密算法。基于非对称可搜索加密构造用户陷门及搜索算法,以实现用户对分层加密数据的有效搜索。利用区块链技术记录和验证搜索工作,通过链上链下的协同存储机制实现与云服务器的数据交互。验证了BC-HABSE方案在困难问题假设下密文和陷门的不可区分性安全。实验结果分析表明,BCHABSE在密钥生成时间、陷门生成时间和搜索时间上优于其它方案,适用于层次文件数据共享场景。 展开更多
关键词 分层访问树 分层属性基加密 可搜索加密 数据共享 区块链 云服务器 协同存储
在线阅读 下载PDF
基于ABE算法的NB-IoT数据安全访问控制方法
19
作者 周峻宇 《智能物联技术》 2025年第5期29-32,共4页
针对窄带物联网(Narrow Band Internet of Things,NB-IoT)数据安全访问控制实践中存在的数据丢包率、误比特率较高问题,提出基于属性加密(Attribute-Based Encryption,ABE)算法的NB-IoT数据安全访问控制方法。采用ABE算法对数据加密,构... 针对窄带物联网(Narrow Band Internet of Things,NB-IoT)数据安全访问控制实践中存在的数据丢包率、误比特率较高问题,提出基于属性加密(Attribute-Based Encryption,ABE)算法的NB-IoT数据安全访问控制方法。采用ABE算法对数据加密,构建NB-IoT数据安全访问控制架构。基于构建的架构,设计基于ABE算法的数据加密方法和数据安全访问授权机制,实现基于ABE算法的NB-IoT数据安全访问控制。实验证明,应用该方法后,数据丢包率不超过1%,误比特率不超过2%,能够有效控制物联网数据非法访问,保证数据安全。 展开更多
关键词 基于属性的加密(abe) 窄带物联网(NB-IoT) 安全访问 密钥 证书
在线阅读 下载PDF
基于区块链的多权威属性基加密方案
20
作者 李杰 马海英 +1 位作者 孙国荣 杨及坤 《计算机应用与软件》 北大核心 2026年第2期356-362,370,共8页
针对现有属性基加密存在属性撤销效率低、用户密钥难协调的问题,将区块链和属性基加密相结合,构造一种基于区块链多权威属性加密方案。该方案利用多个属性权威为用户并行地生成属性私钥,利用智能合约和分布式账本记录用户与其属性之间... 针对现有属性基加密存在属性撤销效率低、用户密钥难协调的问题,将区块链和属性基加密相结合,构造一种基于区块链多权威属性加密方案。该方案利用多个属性权威为用户并行地生成属性私钥,利用智能合约和分布式账本记录用户与其属性之间的映射关系,实现属性私钥分布式分发和撤销,使得属性撤销无需属性私钥更新,减少用户计算开销。安全性证明和效率分析表明,该方案不仅提高属性私钥撤销的效率,且保障数据的前向和后向安全性。 展开更多
关键词 区块链 多权威属性基加密 细粒度授权 属性撤销 物联网数据交易
在线阅读 下载PDF
上一页 1 2 37 下一页 到第
使用帮助 返回顶部