检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:李婷[1] 常利伟[2] LI Ting;CHANG Liwei(Network and Information Education Technology Center,Shanxi University of Finance and Economics,Taiyuan 030006,China;College of Information,Shan.xi University of Finance and Economics,Taiyuan 030006,China)
机构地区:[1]山西财经大学网络与信息教育技术中心,山西太原030006 [2]山西财经大学信息学院,山西太原030006
出 处:《山西大学学报(自然科学版)》2022年第2期387-392,共6页Journal of Shanxi University(Natural Science Edition)
基 金:山西省自然科学基金(201801D221159);山西省高校科技创新基金(2019L0470;2019L0479)。
摘 要:基于属性基的加密方案提供了一种对加密数据进行复杂访问控制的机制。但在大多数属性基加密系统中,密文长短和解密开销会随访问策略的复杂性而增加,限制了在资源有限的设备上运行程序。针对该问题,通过引入外包解密方法,构造了一个高效的、抗共谋攻击的可外包解密的密文策略的属性基加密方案,该方案在加密算法构造过程中引入线性密钥共享矩阵作为输入,并根据该矩阵选择随机指数,使得私钥随机分布,从而实现了抗共谋攻击,且方案在解密过程中引入了外包解密,只需要用户进行少量的计算便可得到密文相应的明文,从而很好解决了资源制约性问题。本文提出的安全证明是在非交互模型下、判定性平行双线性Diffie-Hellman幂元假设下进行的,且通过效率与安全性分析得出本方案拥有良好的性能。Attribute-based encryption scheme proposes a mechanism for complex access control of encrypted data.However,in most attribute-based encryption systems,the length of ciphertext and the cost of decryption increase with the complexity of access policies,which restricts the development of programs running on devices with limited resources.In order to solve the problem,we introduce the outsourcing decryption method,and constructs an efficient,collusive attack resistant attribute based encryption scheme,which can outsource the decryption strategy.In the process of constructing the encryption algorithm,the linear secret sharing shemes access matrix is used as the input,and the random index is selected according to the matrix,which makes the private key randomly distributed,thus realizing the anti-collusion attack.In addition,the scheme introduces the outsourcing decryption in the decryption process,which only needs a small amount of calculation by the user to get the corresponding plaintext of the ciphertext,so as to solve the resource constraint problem.The security proof is provably secure under the noninteractive model and the decisional parallel bilinear Diffie-Hellman exponent assumption.The efficiency and security analysis reveal that the scheme has great performance.
关 键 词:密文策略的属性基加密 双线性映射 抗合谋攻击 外包计算
分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.17.4.144