高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

具有两个可撤销属性列表的密钥策略的属性加密方案

王尚平 余小娟 张亚玲

王尚平, 余小娟, 张亚玲. 具有两个可撤销属性列表的密钥策略的属性加密方案[J]. 电子与信息学报, 2016, 38(6): 1406-1411. doi: 10.11999/JEIT150845
引用本文: 王尚平, 余小娟, 张亚玲. 具有两个可撤销属性列表的密钥策略的属性加密方案[J]. 电子与信息学报, 2016, 38(6): 1406-1411. doi: 10.11999/JEIT150845
WANG Shangping, YU Xiaojuan, ZHANG Yaling. Revocable Key-policy Attribute-based Encryption Scheme with Two Revocation Lists[J]. Journal of Electronics & Information Technology, 2016, 38(6): 1406-1411. doi: 10.11999/JEIT150845
Citation: WANG Shangping, YU Xiaojuan, ZHANG Yaling. Revocable Key-policy Attribute-based Encryption Scheme with Two Revocation Lists[J]. Journal of Electronics & Information Technology, 2016, 38(6): 1406-1411. doi: 10.11999/JEIT150845

具有两个可撤销属性列表的密钥策略的属性加密方案

doi: 10.11999/JEIT150845
基金项目: 

国家自然科学基金(61173192, 61572019), 2014年度西安市碑林区科技计划(GX1407),陕西省自然科学基础研究计划-重点项目(2016JZ001)

Revocable Key-policy Attribute-based Encryption Scheme with Two Revocation Lists

Funds: 

The National Natural Science Foundation of China (61173192, 61572019), Beilin District Science and Technology Plan of Xi,an City 2014 (GX1407), The Key Project of Natural Science Foundation of Shaanxi Province of China (2016JZ001)

  • 摘要: 可撤销的属性加密方案是属性加密方案的延伸和扩展。该文构造了细粒度属性撤销下的具有两个可撤销属性列表的密钥策略的属性加密方案,该方案是对含有单个属性撤销列表方案的推广,新方案涉及两个属性撤销列表,允许两个列表中被撤销用户存在交集或者无关,同时利用追踪算法,判定了用户与私钥的关联性。在选择安全模型下证明了方案的安全性,将方案的安全性规约到求解判定性双线性Diffie-Hellman 指数问题上。
  • SAHAI A and WATERS B. Fuzzy identity-based encryption [J]. Lecture Notes in Computer Science, 2005, 3494: 457-473. doi: 10.1007/11426639_27.
    YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[C]. ACM Symposium on Information, ACM, 2010: 261-270. doi: 10.1145/1755688. 1755720.
    PIRRETTI M, TRAYNOR P, MCDANIEL P, et al. Secure attribute-based systems[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006: 99-112.
    BOLDYREVA A, GOYAL V, and KUMAR V. Identity- based encryption with efficient revocation[C]. Proceedings of the 15th ACM Conference on Computer and Communications Security, New York, 2008: 417-426.
    HINEK M J, JIANG S, SAFAVI-NAINI R, et al. Attribute- based encryption with key cloning protection[J]. Bulletin of the Korean Mathematical Society, 2008, 2008(4): 803-819.
    LI J, REN K, and KIM K. A2BE: Accountable attribute- based encryption for abuse free access control[J]. IACR Cryptology ePrint Archive, 2009: 118.
    ATTRAPADUNG N and IMAI H. Conjunctive broadcast and attribute-based encryption[C]. Lecture Notes in Computer Science, 2009, 5671: 248-265. doi: 10.1007/ 978-3-642-03298-1_16.
    LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption[C]. Advances in Cryptology-EUROCRYPT 2010, Springer Berlin Heidelberg, 2010, 6110: 62-91. doi: 10.1007/978-3-642-13190-5_4.
    VLADIMIR B, DANIEL S, STEINWANDT R, et al. Multi-authority attribute-based encryption with honest-but- curious central authority[J]. International Journal of Computer Mathematics, 2011, 89(3): 268-283.
    LI Q, FENG D, and ZHANG L. An attribute based encryption scheme with fine-grained attribute revocation[C]. Global Communications Conference (GLOBECOM), 2012 IEEE, Anaheim, CA, 2012: 885-890. doi: 10.1109/ GLOCOM. 2012.6503225.
    张彦华, 胡予濮, 江明明, 等. 格上可撤销的基于身份的适应性安全的加密方案[J]. 电子与信息学报, 2015, 37(2): 423-428. doi: 10.11999/JEIT140421.
    ZHANG Yanhua, HU Yupu, JIANG Mingming et al. A lattice-based revocable adaptive-ID secure encryption scheme [J]. Journal of Electronics Information Technology, 2015, 37(2): 423-428. doi: 10.11999/JEIT140421.
    LI Yang, ZHU Jianming, WANG Xiuli, et al. Optimized ciphertext-policy attribute-based encryption with efficient revocation[J]. International Journal of Security and Its Applications, 2013, 7(6): 385-394.
    张应辉, 郑东, 李进, 等. 密文长度恒定且属性直接可撤销的基于属性的加密[J]. 密码学报, 2014, 1(5): 465-480.
    ZHANG Yinghui, ZHENG Dong, LI Jin, et al. Attribute directly-revocable attribute-based encryption with constant ciphertext length[J]. Journal of Cryptologic Research, 2014, 1(5): 465-480.
    VANCE A, LOWRY P B, and EGGETT D. A new approach to the problem of access policy violations: Increasing perceptions of accountability through the user interface[J]. MIS Quarterly, 2015, 39(2): 345-366.
    CL?MENTINE G, SUSILO W, and PLANTARD T. Efficient File Sharing in Electronic Health Records [M].?Information Security Practice and Experience. Springer International Publishing, 2015: 499-513.
    魏江宏, 胡学先, 刘文芬. 多属性机构环境下的属性基认证密钥交换协议[J]. 电子与信息学报, 2012, 34(2): 451-456. doi: 10.3724/SP.J.1146.2011.00701.
    WEI Jianghong, HU Xuexian, and LIU Wenfen. Attribute- based authenticated key exchange protocol in multiple attribute authorities environment[J]. Journal of Electronics Information Technology, 2012, 34(2): 451-456. doi: 10.3724/ SP.J.1146.2011.00701.
  • 加载中
计量
  • 文章访问数:  1319
  • HTML全文浏览量:  144
  • PDF下载量:  513
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-07-13
  • 修回日期:  2016-02-29
  • 刊出日期:  2016-06-19

目录

    /

    返回文章
    返回