检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:闫玺玺[1] 何旭 刘涛 叶青[1] 于金霞[1] 汤永利[1] YAN Xixi;HE Xu;LIU Tao;YE Qing;YU Jinxia;TANG Yongli(School of Computer Science and Technology,Henan Polytechnic University,Jiaozuo 454003,China)
机构地区:[1]河南理工大学计算机科学与技术学院,河南 焦作 454003
出 处:《通信学报》2020年第4期150-161,共12页Journal on Communications
基 金:国家自然科学基金资助项目(No.61802117);“十三五”国家密码发展基金资助项目(No.MMJJ20170122);河南省科技攻关基金资助项目(No.192102210280);河南省高校科技创新团队基金资助项目(No.20IRTSTHN013);河南理工大学创新型科研团队基金资助项目(No.T2018-1)。
摘 要:针对可追踪属性基加密方案利用追踪功能解决密钥委托滥用问题的不完备性,提出了一种抗密钥委托滥用的可追踪属性基加密方案。将秘密参数分享给用户私钥中关联属性的全部组件,使解密过程必须由全部组件共同参与完成,仅由用户私钥的一部分不能进行解密操作,从而实现真正的抗密钥委托滥用。利用一种短签名技术保护用户私钥中的追踪参数,防止追踪参数被伪造,从而获得对用户的追踪能力。同时支持抗密钥委托滥用和可追踪增强了所提方案的安全性。与相关方案的对比分析表明,所提方案在参数尺寸和计算代价上具有更好的性能优势。Aiming at the problem that the traceability of a traceable attribute-based encryption(ABE)scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.148.197.73