检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:闫玺玺[1] 张棋超 杨超超 YAN Xixi;ZHANG Qichao;YANG Chaochao(School of Computer Science and Technology,Henan Polytechnic University,Jiaozuo 454000,P.R.China)
机构地区:[1]河南理工大学计算机科学与技术学院,河南焦作454000
出 处:《重庆邮电大学学报(自然科学版)》2020年第6期1058-1064,共7页Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基 金:“十三五”国家密码发展基金(MMJJ20170122);国家自然科学基金(61802117);河南省科技攻关项目(192102210280)。
摘 要:针对恶意用户出售私钥后难以被追责的问题,同时考虑到实际应用中用户属性存在重要程度不同的需求,提出一种支持叛逆者追踪的权重属性基加密方案,该方案将用户身份信息嵌入到用户的私钥中,从而追踪系统中泄露关键信息的恶意用户。另外将属性权重的思想引入该方案,将属性集通过属性集分割算法转化为属性权重的分割集,采用线性秘密共享实现访问控制,使其更贴近于实际环境。方案证明在q-BDHE(q-bilinear diffie-hellman exponent)假设下满足标准模型下选择明文攻击安全。与其他方案相比,该方案在通信代价和计算代价方面都有显著的提高,更加适用于移动终端设备在云计算中的应用。In practical applications of traditional attribute based encryption scheme,it is difficult to track the malicious user who sells his private keys.And,the user attributes can’t show the level of identity.To solve the problem,a weighted attribute-based encryption scheme with traitor tracing is proposed.In the scheme,the user’s private key which contains the user identity information is used to trace traitors.In addition,the idea of attribute weight is adopted,and the attribute set is transformed into the segmentation set of attribute weight through the attribute set segmentation algorithm.The proposed scheme provides fine-grained and flexible access control based on linear secret sharing.It is proved to be secure against chosen plaintext attack under the q-decisional bilinear diffie-hellman assumption in the standard model.Compared with other related schemes,it has significant improvement in communication and computing cost,and it is more suitable for the application of mobile terminal in cloud computing.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7