高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

可验证外包解密的离线/在线属性基加密方案

赵志远 孙磊 户家富 周时娥

赵志远, 孙磊, 户家富, 周时娥. 可验证外包解密的离线/在线属性基加密方案[J]. 电子与信息学报, 2018, 40(12): 2998-3006. doi: 10.11999/JEIT180122
引用本文: 赵志远, 孙磊, 户家富, 周时娥. 可验证外包解密的离线/在线属性基加密方案[J]. 电子与信息学报, 2018, 40(12): 2998-3006. doi: 10.11999/JEIT180122
Zhiyuan ZHAO, Lei SUN, Jiafu HU, Shie ZHOU. Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption[J]. Journal of Electronics & Information Technology, 2018, 40(12): 2998-3006. doi: 10.11999/JEIT180122
Citation: Zhiyuan ZHAO, Lei SUN, Jiafu HU, Shie ZHOU. Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption[J]. Journal of Electronics & Information Technology, 2018, 40(12): 2998-3006. doi: 10.11999/JEIT180122

可验证外包解密的离线/在线属性基加密方案

doi: 10.11999/JEIT180122
基金项目: 国家973计划(2013CB338000),国家重点研发计划项目(2016YFB0501900)
详细信息
    作者简介:

    赵志远:男,1989年生,博士生,研究方向为云安全与属性加密

    孙磊:男,1973年生,教授,研究方向为云计算与信息安全

    户家富:男,1981年生,讲师,研究方向为网络计算与信息安全

    周时娥:女,1978年生,讲师,研究方向为科技英语与云计算

    通讯作者:

    赵志远  zzy_taurus@foxmail.com

  • 中图分类号: TP309

Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption

Funds: The National 973 Program of China (2013CB338000), The National Key Research Program of China (2016YFB0501900)
  • 摘要: 属性基加密可以为雾-云计算中的数据提供机密性保护和细粒度访问控制,但雾-云计算系统中的移动设备难以承担属性基加密的繁重计算负担。为解决该问题,该文提出一种可验证外包解密的离线/在线属性基加密方案。该方案能够实现离线/在线的密钥生成和数据加密,同时支持可验证外包解密。然后,给出方案的选择明文攻击的安全证明和可验证性的安全证明。之后,该文将转换阶段所需双线性对的计算量降为恒定常数。最后,从理论和实验两方面对所提方案进行性能分析,实验结果表明该方案是有效且实用的。
  • 图  1  本文方案与文献[17,18]方案仿真时间对比

    表  1  计算效率对比分析

    算法 文献[17]方案 文献[18]方案 3OVD-CP-ABE I3OVD-CP-ABE
    密钥生成 离线 $(3s{\rm{ + }}4){E_G} + (s{\rm{ + 1}}){\rm{Mul}}$ $(3s{\rm{ + }}4){E_G} + (s{\rm{ + 1}}){\rm{Mul}}$ $(3s{\rm{ + }}4){E_G} + (s{\rm{ + 1}}){\rm{Mul}}$ $(2s{\rm{ + 5}}){E_G} + (s{\rm{ + 1}}){\rm{Mul}}$
    在线 $s{\rm{Mul}}$ $s{\rm{Mul}}$ $s{\rm{Mul}}$ $s{\rm{Mul}}$
    加密 离线 $(5l{\rm{ + 1}}){E_G} + 1{E_{{G_T}}} + 2l{\rm{Mul}}$ $(5l{\rm{ + 1}}){E_G} + 1{E_{{G_T}}} + 2l{\rm{Mul}}$ $(5l{\rm{ + 1}}){E_G} + 1{E_{{G_T}}} + 2l{\rm{Mul}}$ $(4l{\rm{ + 2}}){E_G} + 1{E_{{G_T}}} + 2l{\rm{Mul}}$
    在线 0 $2{E_G}{\rm{ + }}{\rm{Mul}}$ $3H$ $3H$
    解密 外包 $\begin{gathered} (2y{\rm{ + 1}}){E_{{G_T}}} + y{E_{{G_T}}} \\ {\rm{ + }}(3y{\rm{ + 2}})P + 2y{\rm{Mul}} \\ \end{gathered} $ $\begin{gathered} (2y{\rm{ + 1}}){E_{{G_T}}} + y{E_{{G_T}}} \\ {\rm{ + }}(3y{\rm{ + 2}})P + 2y{\rm{Mul}} \\ \end{gathered} $ $(5y{\rm{ + 5}}){E_G}{\rm{ + 10}}P{\rm{ + 4}}y{\rm{Mul}}$
    用户 $\begin{gathered} (2y{\rm{ + 1}}){E_{{G_T}}} + y{E_{{G_T}}} \\ {\rm{ + }}(3y{\rm{ + 2}})P + 2y{\rm{Mul}} \\ \end{gathered} $ $2{E_G} + 1{E_{{G_T}}} + {\rm{Mul}}$ $1{E_{{G_T}}}{\rm{ + }}3H$ $1{E_{{G_T}}}{\rm{ + }}3H$
    下载: 导出CSV
  • KHAN S, PARKINSON S, and QIN Yongrui. Fog computing security: A review of current applications and security solutions[J]. Journal of Cloud Computing, 2017, 6(1): 19–41 doi: 10.1186/s13677-017-0090-3
    SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457–473. doi: 10.1007/11426639_27.
    GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006: 89–98. doi: 10.1145/1180405.1180418.
    BETHENCOURT J, SAHAI A, and WATERS B. Ciphertext-policy attribute-based encryption[C]. Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, USA, 2007: 321–334. doi: 10.1109/SP.2007.11.
    GREEN M, HOHENBERGER S, and WATERS B. Outsourcing the decryption of ABE ciphertexts[C]. Proceedings of the 20th USENIX Conference on Security, San Francisco, USA, 2011: 34.
    LAI Junzuo, DENG R H, GUAN Chaowen, et al. Attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(8): 1343–1354 doi: 10.1109/TIFS.2013.2271848
    ZHAO Zhiyuan and WANG Jianhua. Verifiable outsourced ciphertext-policy attribute-based encryption for mobile cloud computing[J].KSII Transactions on Internet and Information Systems, 2017, 11(6): 3254–3272 doi: 10.3837/tiis.2017.06.024
    FAN Kai, WANG Junxiong, WANG Xin, et al. A secure and verifiable outsourced access control scheme in fog-cloud computing[J]. Sensors, 2017, 17(7): 1695–1710 doi: 10.3390/s17071695
    LI Jiguo, SHA Fengjie, ZHANG Yichen, et al. Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length[J]. Security and Communication Networks, 2017, 2017: 1–11 doi: 10.1155/2017/3596205
    ZHANG Rui, MA Hui, and LU Yao. Fine-grained access control system based on fully outsourced attribute-based encryption[J]. Journal of Systems and Software, 2017, 125(3): 344–353 doi: 10.1016/j.jss.2016.12.018
    EVEN S, GOLDREICH O, and MICALI S. On-line/off-line digital signatures[C]. Proceedings of the Conference on the Theory and Application of Cryptology, Santa Barbara, USA, 1989: 263–275. doi: 10.1007/0-387-34805-0_24.
    LIU J K, BAEK J, ZHOU Jianying, et al. Efficient online/offline identity-based signature for wireless sensor network[J]. International Journal of Information Security, 2010, 9(4): 287–296 doi: 10.1007/s10207-010-0109-y
    GUO Fuchun, MU Yi, and CHEN Zhide. Identity-based online/offline encryption[C]. Proceedings of the International Conference on Financial Cryptography and Data Security, Cozumel, Mexico, 2008: 247–261. doi: 10.1007/978-3-540-85230-8_22.
    LIU J K and ZHOU Jianying. An efficient identity-based online/offline encryption scheme[C]. Proceedings of the International Conference on Applied Cryptography and Network Security, Paris-Rocquencourt, France, 2009: 156–167. doi: 10.1007/978-3-642-01957-9_10.
    CHOW S S M, LIU J K, and ZHOU Jianying. Identity-based online/offline key encapsulation and encryption[C]. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, 2011: 52–60. doi: 10.1145/1966913.1966922.
    ROUSELAKIS Y and WATERS B. Practical constructions and new proof methods for large universe attribute-based encryption[C]. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Berlin, Germany, 2013: 463–474. doi: 10.1145/2508859.2516672.
    HOHENBERGER S and WATERS B. Online/offline attribute-based encryption[C]. Proceedings of the International Workshop on Public Key Cryptography, Buenos Aires, Argentina, 2014: 293–310. doi: 10.1007/978-3-642-54631-0_17.
    LIU Zechao, JIANG Z L, WANG Xuan, et al. Offline/online attribute-based encryption with verifiable outsourced decryption[J]. Concurrency and Computation:Practice and Experience, 2017, 29(7): 1–17 doi: 10.1002/cpe.3915
  • 加载中
图(1) / 表(1)
计量
  • 文章访问数:  2428
  • HTML全文浏览量:  1004
  • PDF下载量:  68
  • 被引次数: 0
出版历程
  • 收稿日期:  2018-01-29
  • 修回日期:  2018-06-11
  • 网络出版日期:  2018-08-30
  • 刊出日期:  2018-12-01

目录

    /

    返回文章
    返回