Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs  被引量:2

在线阅读下载全文

作  者:Zengpeng LI Vishal SHARMA Chunguang MA Chunpeng GE Willy SUSILO 

机构地区:[1]College of Computer Science and Technology,Qingdao University,Qingdao 266071,China [2]Guizhou Provincial Key Laboratory of Public Big Data,Guizhou University,Guiyang 550025,China [3]ISTD Pillar,Singapore University of Technology and Design(SUTD),Singapore 487372,Singapore [4]College of Computer Science and Engineering,Shandong University of Science and Technology,Qingdao 266590,China [5]College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China [6]School of Computing and Information Technology,University of Wollongong,Wollongong NSW 2522,Australia

出  处:《Science China(Information Sciences)》2021年第6期238-239,共2页中国科学(信息科学)(英文版)

基  金:supported in part by National Natural Science Foundation of China(Grant No.61802214);National Natural Science Foundation of Shandong Province,China(Grant No.ZR2019BF009);Applied Fundamental Research Project of Qingdao(Grant No.19-6-2-6-cg);Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2019BDKFJJ007)。

摘  要:Dear editor,To maintain the confidentiality of the sensitive data,users tend to encrypt their data under an associated access policy(or attributes)before outsourcing them to the cloud.In the traditional access control model via cryptographic approaches,e.g.,ciphertext-policy attribute-based encryption(or CP-ABE),users are allowed to formulate access policies and let the encrypted data associated with access policies.Only authenticated users,whose own attributes matching their formulated access policies,have the privilege to recover the ciphertext.However,once the access policies are formulated,the authorized user cannot update it unless the user downloads and re-encrypts the file under the new access policy.Hence,to achieve dynamic access control,the model of ciphertext-policy attribute-based proxy re-encryption(or CP-AB-PRE)is adopted by integrating the proxy re-encryption(or PRE).

关 键 词:POLICY EDITOR CONSTRAINED 

分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象