Computer Science ›› 2015, Vol. 42 ›› Issue (2): 123-126.doi: 10.11896/j.issn.1002-137X.2015.02.026

Previous Articles     Next Articles

ABS-OSBE Protocol Supporting Sensitive Attributes Protection

ZHANG Bin, LI Dong-hui, XIONG Hou-ren and FEI Xiao-fei   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In order to protect the sensitive attribute in attribute-based access control,an ABS-based OSBE protocol was put forward.ABS-OSBE protocol integrates the ABS algorithm into OSBE,and provides the computational method to both attribute negotiated sides for exchanging information,ensuring the users that meet the access tree structure can obtain sensitive attributes.By extending the description of attributes,the access tree structure can exactly describe “NOT” threshold.A matching method of “NOT” threshold was proposed.Finally,the security of ABS-OSBE protocol was de-monstrated.

Key words: Sensitive attributes,ABS,OSBE,Access tree

[1] 葛维进,胡晓惠.EAEBHCM:一种扩展的基于属性加密的隐藏证书模型[J].通信学报,2012,2:85-92
[2] Winsborough W H,seamons K E,Jones V E.Automated trust negotiation[J].IEEE Computer Society Press,2012(4):362-366
[3] 廖振松,金海,李赤松,等.自动信任协商及其发展趋势[J].计算机应用与软件,2006,7(9):1933-1948
[4] 葛维进,胡晓惠,邓勇.基于隐藏证书的XACML访问控制扩展模型[J].计算机应用与软件,2011,8(3):265-268
[5] Lai J,Deng R H,Li Y.Fully secure cipertext-policy hiding CP-ABE[C]∥ISPEC 2011.2011:24-39
[6] Yu S C,Ren K,Low W J.Attribute-based on-demand multicast group setup with membership anonymity[J].Computer Networks,2010,4(3):377-386
[7] 赵春明.可保护授权隐私性的匿名传输[D].西安:西安电子科技大学,2006(9)
[8] Shaniqng G,Yingpei Z.Attribute-based signature scheme[C]∥International Conference on Information Security and Assu-rance(ISA2008).USA:IEEE,2008:509-511
[9] 马春光,石岚,汪定.基于访问树的属性基签名算法[J].电子科技大学学报,2013,42(3):410-414
[10] Shahandashti S,Safavi-Naini R.Threshold attribute-based signatures and their application to anonymous credential systems[C]∥Progress in Cryptology AFRICACRYPT.Berlin Heidelberg:Spring,2009
[11] 陈剑锋.基于属性签名方案的研究[D].广州 :中山大学,2010,7
[12] 马春光,石岚,周长利,等.属性基关系限签名方案及其安全性研究[J].电子学报,2013,1(5):1012-1015
[13] 王继林,陈晓峰,陈德人.无安全信道的OSBE方案[J].浙江大学学报,2006,0(4):590-593

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .