一种可撤销的KP-ABE方案
作者:

A Revocable KP-ABE Scheme
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [15]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    提出了一个支持私钥撤销的KP-ABE(Key Policy Attribute Based Encryption)方案, 该方案以直接撤销模式对用户进行撤销, 能够在不更新系统公钥和任何一个用户的私钥的情况下完成对用户的撤销, 更新代价较小.同时该方案基于访问树实现与Attrapadung 等人基于LSSS(Linear Secret Sharing Schemes)的支持用户撤销的KP-ABE 方案相比, 构造更为简单. 该方案的安全性可以规约到标准模型下的判定性q-BDHE(q-Bilinear Diffie-Hellman Exponent)假设.

    Abstract:

    This paper proposes a Key Policy Attribute-Based Encryption (KP-ABE) scheme supporting user's private key revocation under the direct revocation model, without affecting the public key and any user's private key, so the cost of the revocation is small. Based on the access tree, the construction of our scheme is simpler than the construction proposed by Attrapadung which is based on linear Secret Sharing Schemes(LSSS). Its security can be reduced to the q-Bilinear Diffie-Hellman Exponent (q-BDHE) assumption under the standard model.

    参考文献
    1 Shamir A. Identity-based cryptosystems and signature schemes.Blakley GR,Chaum D, eds. Advances in Cryptology-CRYPTO'84. Berlin: Springer-Verlag, 1984: 47-53.
    2 Boneh D, Franklin M. Identity-based encryption from the weilpairing. Kilian J, ed. Advances in Cryptology-CRYPTO 2001.Berlin: Springer-Verlag,1995: 311-324.
    3 Sahai A,Waters B. Fuzzy identity-based encryption. Cramer R,ed. Advances in Cryptology-EUROCRYPT 2005. Berlin:Springer-Verlag, 2005: 457-473.
    4 Goyal V, Pandey O, Sahai A, Waters B. Attribute-basedencryption for fine-grained access control of encrypted data.Proc.of the 13th ACM conference on Computer andcommunications security. New York: ACM, 2006: 89-98.
    5 Bethencourt J, Sahai A, Waters B. Ciphertext-policy attributebasedencryption.Proc.of the 2007 IEEE Symposium on Securityand Privacy. Washington DC: IEEE Computer Society,2007: 321-334.
    6 Beimel A. Secure Schemes for Secret Sharing and KeyDistribution. PhD thesis. Israel Institute of Technology,1996.
    7 Attrapdung N, Imai H. Conjunctive broadcast and attributebasedencryption. Shacham H, Waters B, eds. Pairing-BasedCryptography-Pairing 2009. Berlin: Springer-Verlag, 2009:248-265.
    8 Attrapdung N, Imai H. Attribute-based encryption supportingdirect/indirect revocation modes. Parker MG, ed. Cryptographyand Coding. Berlin:Springer-Verlag, 2009: 278-300.
    9 Ostrovsky R, Sahai A, Waters B. Attribute-based encryptionwith non-monotonic access structures. Proc.of the 14th ACMconference on Computer and communications security. NewYork: ACM, 2007: 195-203.
    10 苏金树,曹丹,王小峰,孙一品,胡乔林.属性基加密机制.软件学报,2011,22(6):1299-1315.
    11 Hanaoka Y, Hanaoka G, Shikata J, Imai H. Identity-basedhierarchical strongly key-insulated encryption and its application.Roy B, ed. Advances in Cryptology-ASIACRYPT 2005. Berlin: Springer-Verlag, 2005: 495-514.
    12 Boldyreva A, Goyal V, Kumar V. Identity-based encryptionwith efficient revocation. Proc.of the 15th ACM conferenceon Computer and communications security. New York:ACM, 2008: 417-426.
    13 Yu SC, Wang C, Ren K, Lou WJ. Attribute based datasharing with attribute revocation. Proc.of the 5th ACMSymposium on Information,Computer and CommunicationsSecurity. New York: ACM,2010:261-270.
    14 Boneh D, Gentry C, Waters B. Collusion Resistant BroadcastEncryption with Short Ciphertexts and Private Keys.ShoupV,ed. Advances in Cryptology-CRYPTO 2005. Berlin:Springer-Verlag, 2005: 258-275.
    15 Staddon A, Golle P, Gange M, Rasmussen P. Content-drivenaccess control system. Proc.of the 7th symposium on Identityand trust on the Internet. New York: ACM, 2008: 26-35.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

胡海英,商威.一种可撤销的KP-ABE方案.计算机系统应用,2013,22(9):123-128

复制
分享
文章指标
  • 点击次数:3595
  • 下载次数: 4248
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2013-02-04
  • 最后修改日期:2013-03-18
  • 在线发布日期: 2013-10-10
文章二维码
您是第11432127位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京海淀区中关村南四街4号 中科院软件园区 7号楼305房间,邮政编码:100190
电话:010-62661041 传真: Email:csa (a) iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号