首页 | 本学科首页   官方微博 | 高级检索  
     

基于同态加密的密文策略属性加密方案
引用本文:谭跃生,鲁黎明,王静宇. 基于同态加密的密文策略属性加密方案[J]. 计算机工程与应用, 2019, 55(19): 115-120. DOI: 10.3778/j.issn.1002-8331.1806-0388
作者姓名:谭跃生  鲁黎明  王静宇
作者单位:内蒙古科技大学 信息工程学院,内蒙古 包头,014010;内蒙古科技大学 信息工程学院,内蒙古 包头,014010;内蒙古科技大学 信息工程学院,内蒙古 包头,014010
基金项目:国家自然科学基金;内蒙古自然科学基金
摘    要:属性加密方案极其适用于云存储环境下的数据访问控制,但用户私钥的安全问题仍然是一个极具挑战的问题,影响了属性加密的实际运用。针对该问题,提出一种基于同态加密的密文策略属性加密方案,属性授权中心和云服务中心拥有包含各自系统私钥信息的秘密坐标,两者利用各自秘密坐标进行保密计算两点一线斜率的方式来交互生成用户私钥。分析结果表明,所提方案在消除单密钥生成机构的同时极大地降低了生成用户密钥所需的通信交互次数,从而降低了交互过程中秘密信息泄露的风险。

关 键 词:同态加密  访问控制  密文策略  属性加密

Ciphertext-Policy Attribute Encryption Scheme Based on Homomorphic Encryption
TAN Yuesheng,LU Liming,WANG Jingyu. Ciphertext-Policy Attribute Encryption Scheme Based on Homomorphic Encryption[J]. Computer Engineering and Applications, 2019, 55(19): 115-120. DOI: 10.3778/j.issn.1002-8331.1806-0388
Authors:TAN Yuesheng  LU Liming  WANG Jingyu
Affiliation:School of Information Engineering, Inner Mongolia University of Science and Technology, Baotou, Inner Mongolia 014010, China
Abstract:Attribute encryption scheme is extremely suitable for data access control in cloud storage environment, but the security problem of user private key is still a very challenging problem, which affects the practical application of attribute encryption. Aiming at this problem, the paper proposes a ciphertext-policy attribute encryption scheme based on homomorphic encryption. The attribute authorization center and the cloud service center have secret coordinates containing the private key information of the respective systems. The two use the secret coordinates of each to perform the secret calculation of the two-point and one-line slope to interactively generate the user private key. The analysis results show that the proposed scheme greatly reduces the number of communication interactions required to generate the user key while eliminating the single key generation mechanism, thereby reducing the risk of secret information leakage during the interaction process.
Keywords:homomorphic encryption  access control  ciphertext strategy  attribute encryption  
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号