首页 | 本学科首页   官方微博 | 高级检索  
     

基于CP-ABE的隐藏属性外包解密访问控制
引用本文:陈 成,努尔买买提·黑力力. 基于CP-ABE的隐藏属性外包解密访问控制[J]. 计算机与现代化, 2018, 0(5): 74. DOI: 10.3969/j.issn.1006-2475.2018.05.016
作者姓名:陈 成  努尔买买提·黑力力
基金项目:国家自然科学基金资助项目(61562085,11261057,11461069); 新疆维吾尔自治区人力资源和社会保障厅留学人员科技活动资助项目
摘    要:传统的属性基加密方案中数据拥有者将访问结构和密文保存在一起,于是用户收到密文消息的同时也收到了访问结构,但访问结构本身就可能包含数据拥有者的隐私信息。本文提出一种基于密文策略属性基加密(Ciphertext-Policy Attribute-Based Encryption, CP-ABE)的隐藏属性外包解密访问控制方案。该方案既能隐藏数据拥有者制定的访问控制策略中的属性,同时将计算密集型解密操作交给代理服务器完成,又能保证未经授权的属性授权中心或代理服务器不能独自解密共享的加密数据。

关 键 词:隐藏属性  外包解密  密文策略属性基加密  访问控制  
收稿时间:2018-06-13

Hidden Attribute Outsourced Decryption Access Control Scheme Based on CP-ABE
CHEN Cheng,Nurmamat HELIL. Hidden Attribute Outsourced Decryption Access Control Scheme Based on CP-ABE[J]. Computer and Modernization, 2018, 0(5): 74. DOI: 10.3969/j.issn.1006-2475.2018.05.016
Authors:CHEN Cheng  Nurmamat HELIL
Abstract:In conventional attribute-based encryption schemes, the data owner embeds the access structure to the ciphertext, thus the user receives the ciphertext with the access structure, however the access structure itself might contain private information of the data owner. This paper proposes a hidden attribute outsourced decryption access control scheme based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption). The scheme can not only hide the attributes of the access control policy specified by the data owner, but also deliver the computation intensive decryption operations to the proxy server and guarantee that the unauthorized attribute authorization center or the proxy server can not decrypt the shared encrypted data alone.
Keywords:hidden attribute  outsourced decryption  ciphertext-policy attribute-based encryption  access control  
点击此处可从《计算机与现代化》浏览原始摘要信息
点击此处可从《计算机与现代化》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号