

浏览全部资源
扫码关注微信
新疆大学数学与系统科学学院
Published:2019
移动端阅览
[1]迪力夏提·吾普尔,韩舒艳,古丽米热·尔肯,等.基于时间限制的用户撤销CP-ABE方案[J].新疆大学学报(自然科学版),2019,36(03):324-329.
[1]迪力夏提·吾普尔,韩舒艳,古丽米热·尔肯,等.基于时间限制的用户撤销CP-ABE方案[J].新疆大学学报(自然科学版),2019,36(03):324-329. DOI: 10.13568/j.cnki.651094.2019.03.010.
DOI:10.13568/j.cnki.651094.2019.03.010.
用户撤销是属性基加密中的一个主要环节
但现有的用户撤销方案都采用重新加密和更新密钥来实施用户撤销
导致方案安全性差或计算量大.因此
本文提出一种基于时间限制的用户撤销密文策略属性基加密方案.方案中对每个用户指定一个访问数据的有效期
一旦有效期到期
用户就无法访问数据
从而实现用户的定时撤销.为了防止有效期的篡改或伪造
使用了短签名方法
从而提高了数据的安全性
并且有效地降低整个算法的计算量.
User revocation is an essential part of attribute-based encryption. However
existing user revocation schemes use re-encryption and key update to enforce user revocation
resulting in poor security or a large amount of computation. Therefore proposes a time-based user revocation CP-ABE(Ciphertext-Policy Attribute-Based Encryption) scheme. In this scheme
each user is assigned a validity period for accessing data. Once the validity period expires
the user will not be able to access the data
thus realizing the user's time-based revocation. To prevent tampering or forging the validity period
a short signature method is used
which improves the security of the data and reduces the computational complexity of the whole algorithm effectively.
BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//IEEE Symposium on Security and Privacy.IEEE Computer Society,2007:321-334.
EMURA K,MIYAJI A,NOMURA A,et al.A ciphertext-policy attribute-based encryption scheme with constant ciphertext length[M].Berlin,Heidelberg:Springer Berlin Heidelberg,2009:13-23.
LIU H W,WANG X Y,ZHANG P.Verifying outsourced decryption of CP-ABE with signature[C]//Proceedings of 2015 4th International Conference on Mechatronics,Materials,Chemistry and Computer Engineering(ICMMCCE 2015),2015-12,Xi’an,China:Atlantis Press,2015:2042-2048.
HUR J.Attribute-based secure data sharing with hidden policies in smart grid[J].IEEE Transactions on Parallel&Distributed Systems,2013,24(11):2171-2180.
HELIL N,RAHMAN K.CP-ABE access control scheme for sensitive data set constraint with hidden access policy and constraint policy[J].Security&Communication Networks,2017,2017(6):1-13.
OSTROVSKY R,SAHAI A,WATERS B.Attribute-based encryption with non-monotonic access structures[J].IACR Cryptology ePrint Archive,2007,2007:195-203.
LIANG X,LU R,LIN X.Ciphertext policy attribute based encryption with efficient revocation[J].IEEE Symposium on Security&Privacy,2010,2008:321-334.
BALU A,KUPPUSAMY K.Ciphertext-policy attribute-based encryption with user revocation support[C]//International Conference on Heterogeneous Networking for Quality,Reliability,Security and Robustness.Springer Berlin Heidelberg,2013:696-705.
XU Z Q,Martin K M.Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage[C]//IEEE,International Conference on Trust,Security and Privacy in Computing and Communications.IEEE,2012:844-849.
ZHANG Y,CHEN X,LI J,et al.Attribute-based data sharing with flexible and direct revocation in cloud computing[J].Ksii Transactions on Internet&Information Systems,2014,8(11):4028-4049.
BAYAT M,ARKIAN H R,AREF M R.A revocable attribute-based data sharing scheme resilient to DoS attacks in smart grid[J].Wireless Networks,2015,21(3):871-881.
LIU Q,WANG G J,Wu J.Time-based proxy re-encryption scheme for secure data sharing in a cloud environment[J].Information Sciences,2014,258(3):355-370.
XIE X,MA H,LI J,et al.New ciphertext-policy attribute-based access control with efficient revocation[M].Berlin,Heidelberg:Springer Berlin Heidelberg,2013:373-382.
HAR J,NOH D K.Attribute-based access control with efficient revocation in data outsourcing systems[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(7):1214-21.
ZHANG P,CHEN Z,LIANG K,et al.A cloud-based access control scheme with user revocation and attribute update[M].Information Security and Privacy.Springer International Publishing,2016:525-540.
0
Views
126
下载量
0
CSCD
Publicity Resources
Related Articles
Related Author
Related Institution
京公网安备11010802024621