高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于属性加密的云存储方案研究

王光波 王建华

王光波, 王建华. 基于属性加密的云存储方案研究[J]. 电子与信息学报, 2016, 38(11): 2931-2939. doi: 10.11999/JEIT160064
引用本文: 王光波, 王建华. 基于属性加密的云存储方案研究[J]. 电子与信息学报, 2016, 38(11): 2931-2939. doi: 10.11999/JEIT160064
WANG Guangbo, WANG Jianhua. Research on Cloud Storage Scheme with Attribute-based Encryption[J]. Journal of Electronics and Information Technology, 2016, 38(11): 2931-2939. doi: 10.11999/JEIT160064
Citation: WANG Guangbo, WANG Jianhua. Research on Cloud Storage Scheme with Attribute-based Encryption[J]. Journal of Electronics and Information Technology, 2016, 38(11): 2931-2939. doi: 10.11999/JEIT160064

基于属性加密的云存储方案研究

doi: 10.11999/JEIT160064
基金项目: 

国家高技术研究发展计划(2012AA012704),郑州市科技领军人才项目(131PLJRC644)

Research on Cloud Storage Scheme with Attribute-based Encryption

Funds: 

The National High-tech RD Program of China (2012AA012704), The Science and Technology Leading Talent Project of Zhengzhou (131PLJRC644)

  • 摘要: 云存储中往往采用属性加密方案来实现细粒度的访问控制,为了进一步保护访问控制策略中的敏感信息,并解决授权中心单独为用户生成密钥而产生的密钥托管问题。该文对访问控制策略中的属性进行重新映射,以实现其隐私性。另外在密钥生成算法中设计一个双方计算协议,由用户产生密钥的部分组件,与授权中心共同生成密钥以解决密钥托管问题。最后在标准模型下对方案进行了安全证明,并进行了性能分析与实验验证,实验结果表明,与已有相关方案相比,虽然为了实现访问控制策略隐藏并且解决密钥托管问题增加了额外的计算负载, 但是由于该文将大部分解密工作授权给云存储中心来执行,因此数据访问者的计算负载较小。
  • [1] SAHAI A and WATERS B. Fuzzy Identity-Based Encryption [M]. Heidelberg, Berlin, Springer, 2005: 457-473. doi: 10.1007 /11426639_27.
    [2] YADAV U C. Ciphertext-policy attribute-based encryption with hiding access structure[C]. 2015 IEEE International Advance Computing Conference (IACC), Bangalore, India, 2015: 6-10. doi:  10.1109/IADCC.2015.7154664.
    [3] NARUSE T, MOHRI M, and SHIRAISHI Y. Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating[J]. Human-centric Computing and Information Sciences, 2015, 5(1): 1-13.
    [4] WANG H, YANG B, and WANG Y. Server aided ciphertext- policy attribute-based encryption[C]. IEEE International Conference on Advanced Information Networking Applications Workshops, Gwangju, Korea, 2015: 440-444. doi:  10.1109/WAINA.2015.11.
    [5] QI L, MA J, RUI L, et al. Large universe decentralized key- policy attribute-based encryption[J]. Security Communi- cation Networks, 2015, 8(3): 501-509.
    [6] WANG X, ZHANG J, SCHOOLER E M, et al. Performance evaluation of attribute-based encryption: Toward data privacy in the IoT[C]. IEEE International Conference on Communications (ICC), Sydney, Australia, 2014: 725-730.
    [7] KAPADIA A, TSANG P P, and SMITH S W. Attribute- based publishing with hidden credentials and hidden policies [C]. Network and Distributed System Security Symposium, NDSS 2007, San Diego, CA, USA, 2007: 179-192.
    [8] NISHIDE T, YONEYAMA K, and OHTA K. Attribute- based Encryption with Partially Hidden Encryptor-specified Access Structures[M]. Heidelberg, Berlin, Springer, 2008: 111-129. doi:  10.1007/978-3-540-68914-0_7.
    [9] LAI J, DENG R H, and LI Y. Fully secure cipertext-policy hiding CP-ABE[J]. Lecture Notes in Computer Science, 2011, 6672: 24-39.
    [10] 王海斌, 陈少真. 隐藏访问结构的基于属性加密方案[J]. 电子与信息学报, 2012, 34(2): 457-461.
    [11] WANG Haibin and CHEN Shaozhen. Attribute-based encryption with hidden access structures[J]. Journal of Electronics Information Technology, 2012, 34(2): 457-461.
    [12] HUR J. Attribute-based secure data sharing with hidden policies in smart grid[J]. IEEE Transactions on Parallel Distributed Systems, 2013, 24(11): 2171-2180. doi: 10.1109/ TPDS.2012.61.
    [13] 宋衍, 韩臻, 刘凤梅, 等. 基于访问树的策略隐藏属性加密方案[J]. 通信学报, 2015, 36(9): 119-126.
    [14] SONG Yan, HAN Zhen, LIU Fengmei, et al. Attribute-based encryption with hidden policies in the access tree[J]. Journal on Communications, 2015, 36(9): 119-126.
    [15] LUAN Ibraimi, QIANG Tang, PITER Hartel, et al. Efficient and Provable Secure Ciphertext-policy Attribute-Based Encryption Schemes. Information Security Practice and Experience[M]. Heidelberg, Berlin, Springer, 2009: 1-12.
    [16] CHASE M and CHOW S S M. Improving privacy and security in multi-authority attribute-based encryption[C]. ACM Conference on Computer and Communications Security, Chicago, IL, USA, 2009: 121-130. doi: 10.1145/1653662. 1653678.
    [17] YANG M, LIU F, HAN J L, et al. An efficient attribute based encryption scheme with revocation for outsourced data sharing control[C]. 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control, Beijing, China, 2011: 516-520.
    [18] LIU Z, CAO Z, and WONG D. Traceable ciphertext-policy attribute-based encryption supporting any monotone access structures[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(1): 76-88.
    [19] BONEH D and BOYEN X. Short signatures without random oracles[C]. Advances in Cryptology-EUROCRYPT 2004, Switzerland, 2004: 56-73.
    [20] ZAVATTONI E, PEREZ L J D, MITSUNARI S, et al. Software implementation of an attribute-based encryption scheme[J]. IEEE Transactions on Computers, 2015, 64(5): 1429-1441. [19] CHEUNG L and NEWPORT C. Provably secure ciphertext policy ABE[C]. Proceedings of the 14th ACM Conference on Computer and Communications Security, New York, USA, 2007: 456-465. doi:  10.1145/1315245.1315302.
    [21] LEWKO A, OKAMOTO T, SAHAI A, et al. Fully Secure Functional Encryption: Attribute-based Encryption and (Hierarchical) Inner Product Encryption[M]. Heidelberg, Berlin, Springer, 2010: 62-91. doi: 10.1007/978-3-642-13190- 5_4.
    [22] BELENKIY M, CAMENISCH J, CHASE M, et al. Randomizable Proofs and Delegatable Anonymous Credentials[M]. Heidelberg, Berlin, Springer, 2009: 108-125. doi:  10.1007/978-3-642-03356-8_7.
  • [1] 王汝言, 聂轩, 吴大鹏, 李红霞.  社会属性感知的边缘计算任务调度策略, 电子与信息学报. doi: 10.11999/JEIT190301
    [2] 刘雪艳, 芦婷婷, 杨晓涛.  具有隐私保护的完整性可验证的关键字搜索方案, 电子与信息学报. doi: 10.11999/JEIT190817
    [3] 刘振华, 周佩琳, 段淑红.  支持关键词搜索的属性代理重加密方案, 电子与信息学报. doi: 10.11999/JEIT170448
    [4] 闫玺玺, 刘媛, 李子臣, 汤永利, 叶青.  新的格上多机构属性基加密方案, 电子与信息学报. doi: 10.11999/JEIT170628
    [5] 宋新霞, 陈智罡.  基于抽象解密结构的全同态加密构造方法分析, 电子与信息学报. doi: 10.11999/JEIT170997
    [6] 赵建, 高海英, 胡斌.  基于理想格的高效密文策略属性基加密方案, 电子与信息学报. doi: 10.11999/JEIT170863
    [7] 李龙, 古天龙, 常亮, 徐周波, 钱俊彦.  快速解密且私钥定长的密文策略属性基加密方案, 电子与信息学报. doi: 10.11999/JEIT171086
    [8] 王建华, 王光波, 徐旸, 胡一笑, 张越, 樊理文.  解密成本为常数的具有追踪性的密文策略属性加密方案, 电子与信息学报. doi: 10.11999/JEIT170198
    [9] 赵志远, 朱智强, 王建华, 孙磊.  云存储环境下无密钥托管可撤销属性基加密方案研究, 电子与信息学报. doi: 10.11999/JEIT170317
    [10] 赵志远, 王建华, 徐开勇.  定长密文且快速解密的分布式属性基加密方案研究, 电子与信息学报. doi: 10.11999/JEIT170072
    [11] 王尚平, 余小娟, 张亚玲.  具有两个可撤销属性列表的密钥策略的属性加密方案, 电子与信息学报. doi: 10.11999/JEIT150845
    [12] 魏江宏, 胡学先, 刘文芬.  多属性机构环境下的属性基认证密钥交换协议, 电子与信息学报. doi: 10.3724/SP.J.1146.2011.00701
    [13] 王海斌, 陈少真.  隐藏访问结构的基于属性加密方案, 电子与信息学报. doi: 10.3724/SP.J.1146.2011.00682
    [14] 曹丹, 王小峰, 王飞, 胡乔林, 苏金树.  SA-IBE:一种安全可追责的基于身份加密方案, 电子与信息学报. doi: 10.3724/SP.J.1146.2011.00399
    [15] 刘永亮, 高文, 姚鸿勋, 黄铁军.  用于多媒体加密的基于身份的密钥协商协议的安全性, 电子与信息学报. doi: 10.3724/SP.J.1146.2005.01076
    [16] 杨波, 王育民.  网络环境中基于RSA算法的密钥托管, 电子与信息学报.
    [17] 杨波, 王育民.  基于Asmuth-Bloom门限体制的密钥托管, 电子与信息学报.
    [18] 孙晓蓉, 王育民.  一种软件密钥托管设计方案, 电子与信息学报.
    [19] 宋荣功, 詹榜华, 胡正名.  基于Simmons多部分共享协议的密钥托管方案, 电子与信息学报.
    [20] 孙晓蓉, 王育民.  基于RSA的门限密钥托管方案, 电子与信息学报.
  • 加载中
  • 计量
    • 文章访问数:  678
    • HTML全文浏览量:  41
    • PDF下载量:  683
    • 被引次数: 0
    出版历程
    • 收稿日期:  2016-01-15
    • 修回日期:  2016-08-15
    • 刊出日期:  2016-11-19

    目录

      /

      返回文章
      返回

      官方微信,欢迎关注