首页 | 本学科首页   官方微博 | 高级检索  
     检索      

可支持属性撤销的基于 CP-ABE 可搜索加密方案
引用本文:陈燕俐,杨华山.可支持属性撤销的基于 CP-ABE 可搜索加密方案[J].重庆邮电大学学报(自然科学版),2016,28(4):545-554.
作者姓名:陈燕俐  杨华山
作者单位:南京邮电大学 计算机学院,南京,210023
基金项目:国家自然科学基金资助项目(编号61272084,61202004,61202353,61300240,61302158),江苏省自然科学基金(BK2011754),江苏省高校自然科学研究重大项目“无线传感器网络数据融合安全关键技术研究”(11KJA520002) Foundation ItemsThe National Nature Science Foundation of China(61272084,61202004,61202353,61300240,61302158);The Natural Science Foundation of Jiangsu Province(BK2011754);The Natural Science Foundation of th(11KJA520002)
摘    要:针对目前基于属性的可搜索加密方案存在密钥泄露以及不支持属性撤销的问题,提出了一种云环境下,安全高效、可支持属性撤销的基于 CP-ABE (ciphertext-policy attribute based encryption)的可搜索加密方案。该方案不仅可支持细粒度的访问控制,具有较高的计算效率,且用户密钥使用随机值盲化后提交服务器,保证了用户密钥的保密性和安全性。该方案支持用户属性的撤销,并在属性撤销过程中,将密文更新的大部分工作转移给云服务提供商完成,方案在保证安全性的前提下,进一步降低了用户的计算代价。方案的安全性基于 DL(decisional linear)假设,在通用模型下具有选择明文攻击安全,抗合谋攻击,前向安全和后向安全。

关 键 词:可搜索加密  属性撤销  基于属性加密  访问控制结构  云计算
收稿时间:3/2/2016 12:00:00 AM
修稿时间:2016/6/15 0:00:00

CP-ABE based searchable encryption with attribute revocation
CHEN Yanli and YANG Huashan.CP-ABE based searchable encryption with attribute revocation[J].Journal of Chongqing University of Posts and Telecommunications,2016,28(4):545-554.
Authors:CHEN Yanli and YANG Huashan
Institution:College of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing 210023, P. R. China and College of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing 210023, P. R. China
Abstract:Against the drawback of present searchable encryistion based attribute in secret key leak and non-supported attribute revocation, a secure and efficient CP-ABE ( ciphertext-policy attribute based ercryption) searchable encryption scheme supporting attribute revocation is presented. It supports fine-grained access control, and has perfect computational efficiency. Moreover, the secret key is blinded by using a random number before submitting to sever. In the process of attribute revocation, the work of re-encryption ciphertext is completed by the cloud sever. Furthermore, the analysis shows that the security can be proved under the Decisional Linear assumption. And in the general model, the formula can achieve chosen plaintext attack security. Moreover it can resist collusion attack and has forward and backward secrecy.
Keywords:searchable encryption  attribute revocation  attribute-based encryption  access control structure  could computing
本文献已被 万方数据 等数据库收录!
点击此处可从《重庆邮电大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《重庆邮电大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号