共查询到20条相似文献,搜索用时 15 毫秒
1.
针对Gentry、Sahai和Waters提出的基于容错学习(LWE)问题全同态加密方案(GENTRY C,SALAHAI A,WATERS B.Homomorphic encryption from learning with errors:conceptually-simpler,asymptotically-faster,attribute-based[C]//Proceedings of the 33rd Annual Cryptology Conference.Berlin:Springer,2013:75-92)中只能在单个属性环境下工作的问题,通过借鉴\"模糊系统\"技术,构造了多属性环境下基于LWE的全同态加密方案。首先根据条件等式判断是否为合法用户,然后利用密文扩展算法构造新的密文矩阵,最后采用\"模糊系统\"技术进行方案构造。在标准的基于X不可区分的选择明文攻击(IND-X-CPA)安全游戏中证明了安全性。所提方案优点是可以将满足一定属性的基于属性加密(ABE)方案转换成多属性环境下的全同态加密方案,缺陷是运算复杂度有所增加。 相似文献
2.
Identity-based encryption with equality test (IBEET) combines public key encryption with equality test (PKEET) and identity-based encryption (IBE). In an IBEET scheme, a user with trapdoors is allowed to verify whether different ciphertexts encrypted under different identities correspond to equal plaintexts through the equality test algorithm. Recently, several IBEET schemes were constructed over lattices to resist the potential quantum threats, perhaps since the latticed-based candidates are the most favored ones in the current NIST PQC standardization. However, almost all of the schemes are developed from Lee et al.’s generic construction and hence double both public parameters and ciphertext sizes. In this paper, we propose a more efficient and tightly-secure IBEET scheme which not only achieves a tight reduction with the semi-adaptive security, but also reduces both public parameters and ciphertext sizes. 相似文献
3.
4.
为了增强计算机网络的安全性,保证网络中的信息资源不被非法使用,需要进行访问控制。当前基于网格虚拟组织的访问控制算法通过在网格中建立不同的信任域、在主机之间建立基于身份和行为的访问控制策略,实现以任务发起者为中心的网格虚拟组织的跨域访问控制,建立互信的核心算法并进行逻辑推理,从而实现访问控制算法。但是,这类算法可能会使非法使用的网络被判定为安全网络,因此访问控制的准确度不高。为此,提出一种基于CP-ABE的可撤销属性加密访问控制算法,为实现访问控制,首先 构建基于CP-ABE的可撤销属性加密访问控制的访问树,并通过CP-ABE完成访问控制的初始构建和密钥生成。在此基础上,为提高可撤销属性加密访问控制算法的访问控制效果,在加密算法以及解密算法中写入新文件创建、新用户授权、吊销用户、文件访问等方面过程的设计,实现基于CP-ABE的可撤销属性加密访问控制算法。实验结果表明,采用所提算法进行访问控制时耗时缩短,控制效果较好,且实现过程有所简化,对该领域的研究发展起到了积极作用。 相似文献
5.
6.
Sahai和Waters提出的属性基加密(Attribute-Based Encryption,ABE)能够实现一对多加密,因而具有广泛的应用价值。随着云计算技术的不断发展,云计算也与属性基加密有了紧密的联系。将快速高效的外包技术应用在属性基解密算法中。在云计算中,云服务器存储了客户的密文。当客户对远程数据进行解密时,解密者将转换密钥上传给云服务器。云服务器利用转换密钥将密文转换成一个中间密文并发送给客户,客户解密中间密文并获得明文的计算量很小,从而减轻了解密者的负担。安全性分析和效率分析证明所提出的方法是安全的和高效的。 相似文献
7.
With the increasing trend of outsourcing data to the cloud for efficient data storage, secure data collaboration service including data read and write in cloud computing is urgently required. However, it introduces many new challenges toward data security. The key issue is how to afford secure write operation on ciphertext collaboratively, and the other issues include difficulty in key management and heavy computation overhead on user since cooperative users may read and write data using any device. In this paper, we propose a secure and efficient data collaboration scheme, in which fine-grained access control of ciphertext and secure data writing operation can be afforded based on attribute-based encryption (ABE) and attribute-based signature (ABS) respectively. In order to relieve the attribute authority from heavy key management burden, our scheme employs a full delegation mechanism based on hierarchical attribute-based encryption (HABE). Further, we also propose a partial decryption and signing construction by delegating most of the computation overhead on user to cloud service provider. The security and performance analysis show that our scheme is secure and efficient. 相似文献
8.
9.
属性基加密利用属性集和访问结构之间的匹配关系实现用户解密权限的控制,从功能上高效灵活地解决了“一对多”的密数据共享问题,在云计算、物联网、大数据等细粒度访问控制和隐私保护领域有光明的应用前景。然而,在属性基加密系统中(以密文策略属性基加密为例),一个属性集合会同时被多个用户拥有,即一个解密私钥会对应多个用户,因此用户敢于共享其解密私钥以非法获利。此外,半可信的中心存在为未授权用户非法颁发私钥的可能。针对属性基加密系统中存在的两类私钥滥用问题,通过用户和中心分别对私钥进行签名的方式,提出一个密文策略属性基加密方案。该方案支持追踪性和公开定责性,任何第三方可以对泄露私钥的原始持有者的身份进行追踪,审计中心可以利用公开参数验证私钥是用户泄露的还是半可信中心非法颁发的。最后,可以证明方案的安全性基于其依赖的加密方案、签名方案。 相似文献
10.
When data security is facing growing threats, ordinary encryption techniques cannot meet the needs of comparing, sharing, and classifying data hidden in ciphertexts. At the same time, the advent of the quantum computing era has brought unprecedented challenges to traditional cryptography. Fortunately, a lattice-based PKEET scheme can solve the above problems. In this paper, we design a lattice-based PKE-DET scheme that can support the delegated tester function with satisfying anti-quantum computing security and resisting OMRA attacks. To the best of our knowledge, this is the first PKE-DET scheme that has both kinds of security at the same time. Under the standard model, we prove the security of the scheme based on the LWE hardness assumption. Compared with existing schemes, our scheme has many advantages, such as high security, delegated tester authorization, and small storage space. 相似文献
11.
12.
13.
云存储服务的出现可将文件上传至云服务器,节约了本地的信息存储空间以及管理开销。文件以明文的形式存储显然无法满足隐私保护和安全需求,但若将加密后的文件上传至云服务器,将失去搜索原文件的能力。因此,可搜索加密技术的出现解决了用户如何在文件不解密的情况下搜索加密数据。目前现有的单关键字可搜索加密方案会产生许多与检索内容不符合的信息,没有考虑数据用户细粒度搜索权限和搜索效率,以及因云存储的集中化带来的数据安全和隐私保护等问题。针对以上问题,该文提出了基于区块链的多关键字属性基可搜索加密方案。该方案使用多关键字可搜索加密技术实现了加密数据的有效搜索;利用基于属性的加密技术实现加密数据的细粒度访问控制;结合区块链的智能合约技术,经过多笔交易获得搜索结果。并且利用区块链的不可篡改性,满足了方案中相关性质的公平性,保证了在方案中三方的公平性和安全性并进行了相关分析。在随机预言机模型下,基于困难问题假设证明了方案的关键字安全及陷门安全,即所提方案满足在选择关键字攻击下的关键字密文不可区分性安全和陷门不可区分性安全。最后通过数值分析表明该方案在关键字密文生成阶段和关键字搜索阶段具有较高的效率。并展望了在未... 相似文献
14.
Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate the access rights of the encrypted data stored on a cloud storage system to others without leaking the information of the data to the honest-but-curious cloud server. It provides effectiveness for data sharing as the data owner even using limited resource devices (e.g. mobile devices) can offload most of the computational operations to the cloud. Since its introduction many variants of PRE have been proposed. A Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE), which is regarded as a general notion for PRE, employs the PRE technology in the attribute-based encryption cryptographic setting such that the proxy is allowed to convert an encryption under an access policy to another encryption under a new access policy. CP-ABPRE is applicable to many network applications, such as network data sharing. The existing CP-ABPRE systems, however, leave how to achieve adaptive CCA security as an interesting open problem. This paper, for the first time, proposes a new CP-ABPRE to tackle the problem by integrating the dual system encryption technology with selective proof technique. Although the new scheme supporting any monotonic access structures is built in the composite order bilinear group, it is proven adaptively CCA secure in the standard model without jeopardizing the expressiveness of access policy. We further make an improvement for the scheme to achieve more efficiency in the re-encryption key generation and re-encryption phases. 相似文献
15.
属性基加密机制的"一对多"分发特点使其在外包环境中得到了广泛的应用,然而用户的属性经常会发生动态的变化。因此,针对数据外包环境下属性基加密体制中属性撤销的问题,结合Yan等人提出的属性基加密方案,提出一种外包环境下格上可撤销的密文策略属性基加密方案。方案利用格上LWE问题构建加解密算法,可抵抗量子攻击。采用树形表示单调的访问结构,实现灵活的细粒度访问策略。另外,借助数据外包管理服务器,进行属性密钥的更新和密文的更新,实现属性的即时撤销。方案被证明满足选择属性及选择明文攻击下安全。通过对比分析表明,方案在性能方面有显著的提升,且支持属性即时撤销,更加符合外包环境中用户动态变化需求,如社交网络平台等。 相似文献
16.
17.
18.
19.
20.
提出了一种新的带错误学习问题(learning with errors,LWE)的变种,这种变种中的秘密向量和错误向量的每一个分量都是取自于一个小区间上的一致分布,其中,运用了Applebaum等人提出的转换技术.这种技术将一致秘密的LWE样本映射到另一些LWE样本,这些样本的秘密是服从和错误一样的分布,同时只损失了一小部分的样本.这个变种有和标准LWE一样的最坏情形到平均情形的归约性,同时,它去除了标准LWE问题中的高斯抽样算法.基于新的变种,构造了一个密钥相关消息安全的公钥加密方案.方案去除了原来方案中的高斯抽样算法,取而代之的是小区间上的一致分布的抽样算法,从而降低了密钥生成算法和加密算法的开销. 相似文献