首页 | 官方网站   微博 | 高级检索  
     

可追踪并撤销叛徒的属性基加密方案
引用本文:马海英,曾国荪.可追踪并撤销叛徒的属性基加密方案[J].计算机学报,2012,35(9):1845-1855.
作者姓名:马海英  曾国荪
作者单位:1. 同济大学计算机科学与技术系 上海 201804;嵌入式系统与服务计算教育部重点实验室 上海 201804;南通大学计算机科学与技术学院 江苏南通 226019
2. 同济大学计算机科学与技术系 上海 201804;嵌入式系统与服务计算教育部重点实验室 上海 201804
基金项目:国家“八六三”高技术研究发展计划项目基金,国家自然科学基金,NSFC-微软亚洲研究院联合资助项目,上海市优秀学科带头人计划项目,教育部博士点基金,教育部网络时代的科技论文快速共享专项研究课题
摘    要:属性基加密(ABE)是一种有效地对加密数据实现细粒度访问控制的密码学体制.在ABE系统中,存在恶意用户(或叛徒)泄露私钥生成盗版解码器,并将其分发给非法用户的问题.现有的解决方案仅能追查到密钥泄漏者的身份,但不能将其从ABE系统中撤销.文中提出了一种既可追踪又可撤销叛徒的属性基加密方案(ABTR).首先,给出一个具有扩展通配符的属性基加密方案(GWABE),基于3个3素数子群判定假设,采用双系统加密方法证明该GWABE方案是完全安全的.然后,利用完全子树构架将GWABE转化成ABTR方案,并证明该ABTR方案是完全安全的,且用户私钥长度是固定的.而此前的可追踪叛徒的ABE方案仅满足选择安全性.

关 键 词:属性基加密  访问控制  完全子树框架  叛徒追踪  撤销

An Attribute-Based Encryption Scheme for Traitor Tracing and Revocation Together
MA Hai-Ying , ZENG Guo-Sun.An Attribute-Based Encryption Scheme for Traitor Tracing and Revocation Together[J].Chinese Journal of Computers,2012,35(9):1845-1855.
Authors:MA Hai-Ying  ZENG Guo-Sun
Affiliation:1),2)1)(Department of Computer Science and Technology,Tongji University,Shanghai 201804)2)(The Key Laboratory of Embedded System and Service Computing,Ministry of Education,Shanghai 201804)3)(College of Computer Science and Technology,Nantong University,Nantong,Jiangsu 226019)
Abstract:Attribute-based encryption(ABE) is an effective cryptographic primitive for achieving fine-grained access control of encrypted data.A well-known concern in the ABE system is that malicious users(or traitors) leak their private keys to construct pirate decryption devices and distribute them to illegal users.The existing solutions can only trace the identities of users who leaked their keys,but they can not revoke the leaked keys from the ABE system.This paper proposes an attribute-based encryption scheme for traitor tracing and revocation together(ABTR).We first introduce an ABE scheme with generalized wildcards(GWABE).Under three assumptions of the subgroup decision problem for 3 primes(3P-SDP),we prove that the GWABE scheme is fully secure by using the dual system encryption method.Then we transform the GWABE scheme into an ABTR scheme by using the complete subtree framework.The ABTR scheme is proved to be fully secure,and provides the nice feature of having constant private key size.However,the previous ABE schemes for traitor tracing were only proved secure in the selective model.
Keywords:attribute-based encryption  access control  complete subtree framework  traitor tracing  revocation
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号