Computer Science ›› 2018, Vol. 45 ›› Issue (11): 124-129.doi: 10.11896/j.issn.1002-137X.2018.11.018

• Information Security • Previous Articles     Next Articles

Multi-authority Encryption Scheme Based on Public and Private Attributes

CHU Xiao-lu, LIU Pei-shun   

  1. (College of Information Science and Engineering,Ocean University of China,Qingdao,Shandong 266001,China)
  • Received:2017-10-23 Published:2019-02-25

Abstract: The attribute-based encryption method can simplify the problem of key management and access control in cloud computing environment,and it’s suitable for cloud environment.This paper proposed a multi-authority encryption scheme based on public and private attributes.In this scheme,the attributes are divided into public attribute and private attribute.The user’s public property is constitutive of the user’s role authority information,etc.The user’s private property is composed of the password and the identification code of devices,etc.By using the public property to implement access control,the data can be shared safely on the cloud server.By using the private property to implement the security control of information flow,it can ensure that only the specific user uses data on a specific device.This scheme can realize key tracing and attribute revocation.Encryption based on private attributes can also achieve anti-conspiracy attacks.

Key words: Anti-conspiracy attacks, Attribute-based encryption, Cloud computing, Selective security

CLC Number: 

  • TP309
[1]SAHAI A,WATERS B.Fuzzy identity-based encryption∥International Conference on Theory and Applications of Cryptographic Techniques.Springer-Verlag,2005:457-473.
[2]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-Based Encryption for Fine-Grained Access Control of Encryption Data[C]∥ACM Conference on Computer and Communication Security (CCS 2006).New York:ACM Press,2006:89-98.
[3]BETHENCOURTJ,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]∥2017 IEEE Symposium on Security and Privacy.Berkeley:IEEE Press,2018(4):321-334.
[4]CHASE M.Multi-authority attribute based encryption[C]∥ Theory of Cryptography.Berlin,Heidelberg:Springer Press,2007:515-534.
[5]GOYAL V,JIAN A,PANDEY O,et al.Bounded ciphertext po- licy attribute based encryption[C]∥International Colloquium on Automata,Languages,and Programming.Berlin,Heidelberg:Springer Press,2008:579-591.
[6]WATER B.Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[C]∥International Workshop on Public Key Cryptography.Taormina:Springer,2011:53-70.
[7]HINEK M J.Attribute-Based Encryption with Key Cloning Pro- tection.Cryptology Eprint Archive Report,2006,2008(4):803-819.
[8]RUJ S,NAYAK A,STOJMENOVIC I.DACC:Distributed Access.Control in Clouds[C]∥2011 IEEE 10th International Conference on Trust,Security and Privacy in Computing and Communications.Changsha:IEEE Press,2011:91-98.
[9]CHEN J,LIM H W,LING S,et al.Shorter IBE and signatures via asymmetric pairings [C]∥International Conference on Pairing-Based Cryptography.Cologne:Springer Press,2012:122-140.
[10]LEWKO A B,WATERS B.New proof methods for attribute-based encryption:Achieving full security through selective techniques [C]∥Advances in Cryptology-CRYPTO.Santa Barbara:Springer Press,2012:180-198.
[11]CHASE M.Multi-authority attribute-based encryption[C]∥The Fourth Theory of Cryptography Conference (TCC 2007).Berlin,Heidelberg:Springer Press,2007:515-534.
[12]CAOZ F.New directions of modern cryptography [M].Boca Raton:CRC Press,2012.
[13]LEWKO A B,Waters B.Decentralizing attribute-based encryption [C]∥Annual International Conference on the Theory and Applications of Cryptographic Techniques.Tallinn:Springer,2011:568-588.
[14]TANG Q,JI D Y.Multi-authority verifiable attribute based encryption[J].Journal of Wuhan University(Science Edition),2008,54(5):607-610.(in Chinese)
唐强,姬东耀.多授权中心可验证的基于属性的加密方案[J].武汉大学学报(理学版),2008,54(5):607-610.
[15]LEWKO A,WATERS B.Decentralizing attribute-based encryption[C]∥Advances in Cryptology-EUROCRYPT.2011:568-588.
[16]YANG K,JIA X H.Attributed-based Access Control for Multi-authority System in Cloud Storage[C]∥2012 IEEE 32nd International Conference on Distributed Computing Systems.Macau:IEEE Press,2012:536-545.
[17]YANG K,JIA X H.Expressive,Efficient and Revocable Data Access Control for Multi-Authority Cloud Storage[C]∥IEEE Transactions on Parallel and Distributed Systems.IEEE Computer Society:IEEE Press,2013:1735-1744.
[18]ROUSELAKIS Y,WATERS B.Efficient statically-secure largeu- niverse multi-authority attribute-based encryption [C]∥International Conference on Financial Cryptography and Data Security.Berlin,Heidelberg:Springer Press,2015:315-332.
[19]YANG X D,YANG M M,YANG P,et al.A Multi-authority Attribute-Based Encryption Access Control for Social Network[C]∥2017 3rd IEEE International Conference on Control Scien-ce and Systems Engineering (ICCSSE).Beijing:IEEE Press,2017:671-674.
[20]FENG D G,CHEN C.Research on Attribute-based Cryptography[J].Journal of Cryptologic Research,2014,1(1):1-12.(in Chinese)
冯登国,陈成.属性密码学研究[J].密码学报,2014,1(1):1-12.
[21]CAO Z F.New Development of Cryptography[J].Journal of Sichuan University,2015,1(47):1-12.(in Chinese)
曹珍富.密码学的新发展[J].四川大学学报,2015,1(47):1-12.
[22]CHEND W,WANL Q,WANG C,et al.A Multi-authority Attribute-based Encryption Scheme with Pre-decryption[C]∥2015 Seventh International Symposium on Parallel Architectures,Algorithms and Programming(PAAP).Nanjing:IEEE Press,2015:223-228.
[23]HU P,GAO H Y.Key-Policy Attribute-Based Encryption Sc- heme for General Circuits[J].Journal of Software,2016,27(6):1498-1510.(in Chinese)
胡鹏,高海英.一种实现一般电路的密钥策略的属性加密方案[J].软件学报,2016,27(6):1498-1510.
[24]BEIMEL A.Secure schemes for secret sharing and key distribution.Phd Thesis Israel Institute of Technology Technion,1996.http://www.dphu.org/uploads/attachements/books/books_1542_0.pdf.
[25]LIU Z,CAO Z F,WONG D S.White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures[C]∥IEEE Transaction on Information Forensics and Security.IEEE Signal Processing Society:IEEE Press,2013:76-88.
[1] GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321.
[2] WANG Zheng, JIANG Chun-mao. Cloud Task Scheduling Algorithm Based on Three-way Decisions [J]. Computer Science, 2021, 48(6A): 420-426.
[3] PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319.
[4] CHEN Yu-ping, LIU Bo, LIN Wei-wei, CHENG Hui-wen. Survey of Cloud-edge Collaboration [J]. Computer Science, 2021, 48(3): 259-268.
[5] JIANG Hui-min, JIANG Zhe-yuan. Reference Model and Development Methodology for Enterprise Cloud Service Architecture [J]. Computer Science, 2021, 48(2): 13-22.
[6] WANG Wen-juan, DU Xue-hui, REN Zhi-yu, SHAN Di-bin. Reconstruction of Cloud Platform Attack Scenario Based on Causal Knowledge and Temporal- Spatial Correlation [J]. Computer Science, 2021, 48(2): 317-323.
[7] HE Heng, JIANG Jun-jun, FENG Ke, LI Peng, XU Fang-fang. Efficient Multi-keyword Retrieval Scheme Based on Attribute Encryption in Multi-cloud Environment [J]. Computer Science, 2021, 48(11A): 576-584.
[8] MAO Han-yu, NIE Tie-zheng, SHEN De-rong, YU Ge, XU Shi-cheng, HE Guang-yu. Survey on Key Techniques and Development of Blockchain as a Service Platform [J]. Computer Science, 2021, 48(11): 4-11.
[9] WANG Qin, WEI Li-fei, LIU Ji-hai, ZHANG Lei. Private Set Intersection Protocols Among Multi-party with Cloud Server Aided [J]. Computer Science, 2021, 48(10): 301-307.
[10] LEI Yang, JIANG Ying. Anomaly Judgment of Directly Associated Nodes Under Cloud Computing Environment [J]. Computer Science, 2021, 48(1): 295-300.
[11] XU Yun-qi, HUANG He, JIN Zhong. Application Research on Container Technology in Scientific Computing [J]. Computer Science, 2021, 48(1): 319-325.
[12] ZHNAG Kai-qi, TU Zhi-ying, CHU Dian-hui, LI Chun-shan. Survey on Service Resource Availability Forecast Based on Queuing Theory [J]. Computer Science, 2021, 48(1): 26-33.
[13] LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323.
[14] MA Xiao-xiao and HUANG Yan. Publicly Traceable Accountable Ciphertext Policy Attribute Based Encryption Scheme Supporting Large Universe [J]. Computer Science, 2020, 47(6A): 420-423.
[15] LIANG Jun-bin, ZHANG Min, JIANG Chan. Research Progress of Social Sensor Cloud Security [J]. Computer Science, 2020, 47(6): 276-283.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!