首页 | 本学科首页   官方微博 | 高级检索  
     

可公开定责的密文策略属性基加密方案
引用本文:马潇潇,于刚.可公开定责的密文策略属性基加密方案[J].计算机科学,2017,44(5):160-165.
作者姓名:马潇潇  于刚
作者单位:郑州信息科技职业学院 郑州450046,中国人民解放军信息工程大学数学工程与先进计算国家重点实验室 郑州450001;华东师范大学计算机科学与软件工程学院 上海200062
基金项目:本文受国家自然科学基金(61371083),中国博士后科学基金(2016M591629),河南省高等学校重点科研项目(16A420006)资助
摘    要:属性基加密利用属性集和访问结构之间的匹配关系实现用户解密权限的控制,从功能上高效灵活地解决了“一对多”的密数据共享问题,在云计算、物联网、大数据等细粒度访问控制和隐私保护领域有光明的应用前景。然而,在属性基加密系统中(以密文策略属性基加密为例),一个属性集合会同时被多个用户拥有,即一个解密私钥会对应多个用户,因此用户敢于共享其解密私钥以非法获利。此外,半可信的中心存在为未授权用户非法颁发私钥的可能。针对属性基加密系统中存在的两类私钥滥用问题,通过用户和中心分别对私钥进行签名的方式,提出一个密文策略属性基加密方案。该方案支持追踪性和公开定责性,任何第三方可以对泄露私钥的原始持有者的身份进行追踪,审计中心可以利用公开参数验证私钥是用户泄露的还是半可信中心非法颁发的。最后,可以证明方案的安全性基于其依赖的加密方案、签名方案。

关 键 词:属性基加密  可追踪性  可公开定责性  不可否认性
收稿时间:2016/3/28 0:00:00
修稿时间:2016/8/14 0:00:00

Publicly Accountable Ciphertext-policy Attribute-based Encryption Scheme
MA Xiao-xiao and YU Gang.Publicly Accountable Ciphertext-policy Attribute-based Encryption Scheme[J].Computer Science,2017,44(5):160-165.
Authors:MA Xiao-xiao and YU Gang
Affiliation:Zhengzhou Vocational University of Information and Technology,Zhengzhou 450046,China and State Key Laboratory of Mathematical Engineering and Advanced Computing,PLA Information Engineering University,Zhengzhou 450001,China;School of Computer Science and Software Engineering,East China Normal University,Shanghai 200062,China
Abstract:Ciphertext-policy attribute-based encryption (ABE) enables fine-grained access control of decryption privilege by using the matching relation between the attribute set and the access structure,and is a promising one-to-many encryption primitive which has a bright application prospect in cloud computing,big data etc.However,an attribute set may be owned by many users in ABE, i.e. one decryption key may belong to many users.Thus,malicious users dare to leak their decryption privileges to others for profits.Furthermore,a semi-trust authority may illegally generate decryption keys to unauthorized users.To solve these two kinds of key abuses in ABE,we proposed a publicly accountable ciphertext-policy attribute-based encryption scheme by embedding both signatures of user and authority into the secret key.The proposed scheme can achieve traceability and accountability,in which anybody can trace the identity of a leaked decryption key,and an auditor can verify whether the leaked key is shared by a malicious user or is illegally generated by a semi-trust authority.At last,the security of the proposed scheme can be proved based on the security of its atomic encryption and signature schemes.
Keywords:Attribute-based encryption  Traceability  Public accountability  Nonrepudiation
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号