一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

云存儲(chǔ)環(huán)境下無密鑰托管可撤銷屬性基加密方案研究

趙志遠(yuǎn) 朱智強(qiáng) 王建華 孫磊

趙志遠(yuǎn), 朱智強(qiáng), 王建華, 孫磊. 云存儲(chǔ)環(huán)境下無密鑰托管可撤銷屬性基加密方案研究[J]. 電子與信息學(xué)報(bào), 2018, 40(1): 1-10. doi: 10.11999/JEIT170317
引用本文: 趙志遠(yuǎn), 朱智強(qiáng), 王建華, 孫磊. 云存儲(chǔ)環(huán)境下無密鑰托管可撤銷屬性基加密方案研究[J]. 電子與信息學(xué)報(bào), 2018, 40(1): 1-10. doi: 10.11999/JEIT170317
ZHAO Zhiyuan, ZHU Zhiqiang, WANG Jianhua, SUN Lei. Revocable Attribute-based Encryption with Escrow-free in Cloud Storage[J]. Journal of Electronics & Information Technology, 2018, 40(1): 1-10. doi: 10.11999/JEIT170317
Citation: ZHAO Zhiyuan, ZHU Zhiqiang, WANG Jianhua, SUN Lei. Revocable Attribute-based Encryption with Escrow-free in Cloud Storage[J]. Journal of Electronics & Information Technology, 2018, 40(1): 1-10. doi: 10.11999/JEIT170317

云存儲(chǔ)環(huán)境下無密鑰托管可撤銷屬性基加密方案研究

doi: 10.11999/JEIT170317 cstr: 32379.14.JEIT170317
基金項(xiàng)目: 

國家重點(diǎn)研發(fā)計(jì)劃(2016YFB0501900),國家973計(jì)劃項(xiàng)目(2013CB338000)

Revocable Attribute-based Encryption with Escrow-free in Cloud Storage

Funds: 

The National Key Research Program of China (2016YFB0501900), The National 973 Program of China (2013CB338000)

  • 摘要: 屬性基加密因其細(xì)粒度訪問控制在云存儲(chǔ)中得到廣泛應(yīng)用。但原始屬性基加密方案存在密鑰托管和屬性撤銷問題。為解決上述問題,該文提出一種密文策略的屬性基加密方案。該方案中屬性權(quán)威與中央控制通過安全兩方計(jì)算技術(shù)構(gòu)建無密鑰托管密鑰分發(fā)協(xié)議解決密鑰托管問題。通過更新屬性版本密鑰的方式達(dá)到屬性級(jí)用戶撤銷,同時(shí)通過中央控制可以實(shí)現(xiàn)系統(tǒng)級(jí)用戶撤銷。為減少用戶解密過程的計(jì)算負(fù)擔(dān),將解密運(yùn)算過程中復(fù)雜對(duì)運(yùn)算外包給云服務(wù)商,提高解密效率。該文基于q-Parallel BDHE假設(shè)在隨機(jī)預(yù)言機(jī)模型下對(duì)方案進(jìn)行了選擇訪問結(jié)構(gòu)明文攻擊的安全性證明。最后從理論和實(shí)驗(yàn)兩方面對(duì)所提方案的效率與功能性進(jìn)行了分析。實(shí)驗(yàn)結(jié)果表明所提方案無密鑰托管問題,且具有較高系統(tǒng)效率。
  • ZHANG Yuqing, WANG Xiaofei, LIU Xuefeng, et al. Survey on cloud computing security[J]. Journal of Software, 2016, 27(6): 1328-1348. doi: 10.13328/j.cnki.jos.005004.
    張玉清, 王曉菲, 劉雪峰, 等. 云計(jì)算環(huán)境安全綜述[J]. 軟件學(xué)報(bào), 2016, 27(6): 1328-1348. doi: 10.13328/j.cnki.jos.005004.
    MOROVATI K, KADAM S, and GHORBANI A. A network based document management model to prevent data extrusion[J]. Computers Security, 2016, 59(c): 71-91. doi: 10.1016/j.cose.2016.02.003.
    BETHENCOURT J, SAHAI A, and WATERS B. Ciphertext-policy attribute-based encryption[C]. 2007 IEEE Symposium on Security and Privacy (SP'07), Berkeley, CA, USA, 2007: 321-334. doi: 10.1109/SP.2007.11.
    LIU C W, HSIEN W F, YANG C C, et al. A survey of attribute-based access control with user revocation in cloud data storage[J]. International Journal of Network Security, 2016, 18(5): 900-916.
    PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure attribute-based systems[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006: 99-112. doi: 10.1145/ 1180405.1180419.
    BOLDYREVA A, GOYAL V, and KUMAR V. Identity- based encryption with efficient revocation[C]. Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2008: 417-426. doi: 10.1145/1455770.1455823.
    HUANG Q, MA Z, YANG Y, et al. EABDS: Attribute-based secure data sharing with efficient revocation in cloud computing[J]. Chinese Journal of Electronics, 2015, 24(4): 862-868. doi: 10.1049/cje.2015.10.033.
    IBRAIMI L, PETKOVIC M, NIKOVA S, et al. Mediated ciphertext-policy attribute-based encryption and its application[C]. Information Security Applications: 10th International Workshop, Busan, Korea, 2009: 309-323. doi: 10.1007/978-3-642-10838-9_23.
    YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[C]. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, 2010: 261-270. doi: 10.1145/1755688. 1755720.
    HUR J and NOH D K. Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(7): 1214-1221. doi: 10.1109/TPDS.2010.203.
    YANG K, JIA X, and REN K. Attribute-based fine-grained access control with efficient revocation in cloud storage systems[C]. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China, 2013: 523-528. doi: 10.1145/ 2484313.2484383.
    ZU L, LIU Z, and LI J. New ciphertext-policy attribute-based encryption with efficient revocation[C]. IEEE International Conference on Computer and Information Technology, Xi,an, China, 2014: 281-287. doi: 10.1109/CIT.2014.97.
    QIAN H, LI J, ZHANG Y, et al. Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation[J]. International Journal of Information Security, 2015, 14(6): 487-497. doi: 10.1007/ s10207-014-0270-9.
    王尚平, 余小娟, 張亞玲. 具有兩個(gè)可撤銷屬性列表的密鑰策略的屬性加密方案[J]. 電子與信息學(xué)報(bào), 2016, 38(6): 1406-1411. doi: 10.11999/JEIT150845.
    WANG Shangping, YU Xiaojuan, and ZHANG Yaling. Revocable key-policy attribute-based encryption scheme with two revocation lists[J]. Journal of Electronics Information Technology, 2016, 38(6): 1406-1411. doi: 10.11999/ JEIT150845.
    VAANCHIG N, CHEN W, and QIN Z. Fine-grained access control for cloud data sharing by secure and efficient attribute-revocable ciphertext-policy attribute-based encryption[J]. International Journal of Security and Its Applications, 2016, 10(10): 303-320. doi: 10.14257/ijsia. 2016.10.10.27.
    HUR J. Improving security and efficiency in attribute-based data sharing[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(10): 2271-2282. doi: 10.1109/TKDE. 2011.78.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  1853
  • HTML全文瀏覽量:  238
  • PDF下載量:  395
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2017-04-11
  • 修回日期:  2017-07-07
  • 刊出日期:  2018-01-19

目錄

    /

    返回文章
    返回