首页 | 本学科首页   官方微博 | 高级检索  
     

支持撤销的外包加解密CP-ABE方案
引用本文:欧毓毅,汪倩倩,顾国生.支持撤销的外包加解密CP-ABE方案[J].计算机应用研究,2020,37(11):3373-3377.
作者姓名:欧毓毅  汪倩倩  顾国生
作者单位:广东工业大学 计算机学院,广州510006;广东工业大学 计算机学院,广州510006;广东工业大学 计算机学院,广州510006
基金项目:广东省科技计划;国家自然科学基金;广州市科技计划
摘    要:属性基加密(attribute-based encryption,ABE)方案在云存储中得到了越来越广泛的应用,它能够实现细粒度的访问控制,但是现有的大多数ABE方案存在撤销方案效率低、开销大的问题。为了解决这一问题,提出一种更高效、细粒度的支持属性撤销的属性基加密方案。该方案将部分加解密运算外包给代理服务器,从而降低用户的加解密计算量。同时还提出了一种有效的属性撤销方法,该方法只需更新与撤销属性相关联的密文和用户密钥,所以属性撤销的代价很小。并结合了双因子身份认证机制,提高算法的安全性。该方案基于DBDH假设,在标准模型下被证明是安全的。

关 键 词:属性撤销  属性基加密  外包加解密计算  双因子身份认证
收稿时间:2019/6/3 0:00:00
修稿时间:2020/9/27 0:00:00

Outsourcing encryption and decryption CP-ABE scheme with revocation
Ou Yuyi,Wang Qianqian and Gu Guosheng.Outsourcing encryption and decryption CP-ABE scheme with revocation[J].Application Research of Computers,2020,37(11):3373-3377.
Authors:Ou Yuyi  Wang Qianqian and Gu Guosheng
Affiliation:Guangdong University of Technology,,
Abstract:ABE scheme has been more and more widely used in cloud storage, it can achieve fine-granularity access control. However, most of the existing ABE schemes have the problems of low efficiency and high overhead. In order to solve this problem, this paper proposed a more efficient and fine-grained attribute-based encryption scheme supporting attribute revocation. The transfers the complex computation of the encryption and decryption process to the proxy server, thus reducing the encryption and decryption computation of users. This paper also proposed an efficient attribute revocation method which concentrated on the update of the ciphertexts and users'' secret keys associated with the corresponding revoked attributes, so the cost of attribute revocation is very small. And combined the method of two-factor identity authentication to improve the security of the algorithm. The theoretical analysis show that this scheme is safe under the standard model based on the DBDH hypothesis.
Keywords:attribute revocation  attribute-based encryption  outsourced encryption and decryption computation  two-factor authentication
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号