首页 | 本学科首页   官方微博 | 高级检索  
     

适应性安全的可追踪叛徒的基于属性加密方案
引用本文:马海英,曾国荪,陈建平,王金华,王占君. 适应性安全的可追踪叛徒的基于属性加密方案[J]. 通信学报, 2016, 37(1): 76-87. DOI: 10.11959/j.issn.1000-436x.2016009
作者姓名:马海英  曾国荪  陈建平  王金华  王占君
作者单位:1. 南通大学计算机科学与技术学院,江苏 南通 226019;2. 同济大学计算机科学与技术系,上海 201804;3. 南通大学理学院,江苏 南通 226007
基金项目:国家自然科学基金资助项目(No.61402244, No.61272424, No.61202006, No.61272107, No.61202173, No.61103068);NSFC-微软亚洲研究院联合基金资助项目(No.60970155);上海市优秀学科带头人计划基金资助项目(No.10XD1404400);教育部博士点基金资助项目(No.20090072110035);上海自然科学基金资助项目(No.13ZR1443100);南通大学校级自然科学基金资助项目(No.15Z06)
摘    要:针对基于属性加密(ABE, attribute-base encryption)机制存在的密钥滥用问题,为每个用户增加唯一的身份标识符,将联合安全编码和叛徒追踪机制引入到ABE方案中,给出适应性安全的可追踪叛徒ABE的定义、安全模型和可追踪模型,提出一种适应性安全的可追踪叛徒的ABTT方案,该方案允许适应性追踪指定策略盗版解码器中的叛徒。基于合数阶群上的子群判定假设和DDH假设,证明所提方案是适应性安全和适应性可追踪的。因此,所提方案不仅可以适应性追查指定策略盗版解码器中的叛徒,而且进一步增强了ABE系统的安全性,具有一定的理论和应用价值。

关 键 词:基于属性加密;叛徒追踪;双系统加密;适应性安全;联合安全编码

Adaptively secure attribute-based encryption for traitor tracing
ying MAHai,sun ZENGGuo,ping CHENJian,hua WANGJin,jun WANGZhan. Adaptively secure attribute-based encryption for traitor tracing[J]. Journal on Communications, 2016, 37(1): 76-87. DOI: 10.11959/j.issn.1000-436x.2016009
Authors:ying MAHai  sun ZENGGuo  ping CHENJian  hua WANGJin  jun WANGZhan
Affiliation:1. College of Computer Science and Technology,Nantong University,Nantong 226019,China;2. Department of Computer Science and Technology,Tongji University,Shanghai 201804,China;3. School of Science,Nantong University,Nantong 226007,China
Abstract:For the key abuse problem in attribute-based encryption (ABE), each user was identified by his unique identity, and the collusion secure codes and the traitor tracing mechanism were introduced to the ABE scheme. The definition, security model and tracing model for adaptively secure attribute-based encryption for traitor tracing (ABTT)were formalized, and an adaptively secure ABTT scheme was proposed, which may trace traitors in policy-specific pirate decorders. Under these subgroup decision assumptions in composite order groups and the DDH assumption, adaptively secure and can adaptively trace traitors were proved. Therefore, the scheme not only was capable of tracing adaptively traitors in policy-specific pirate decorders, but also further strengthens the security of ABE system, which has theoretical and practical values.
Keywords:attribute-based encryption   traitor tracing   dual system encryption   adaptive security   collusion secure code
点击此处可从《通信学报》浏览原始摘要信息
点击此处可从《通信学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号