计算机科学 ›› 2016, Vol. 43 ›› Issue (2): 175-178.doi: 10.11896/j.issn.1002-137X.2016.02.038

• 信息安全 • 上一篇    下一篇

隐藏访问结构的密文策略的属性基加密方案

汪海萍,赵晶晶   

  1. 河海大学计算机与信息学院 南京211100,河海大学计算机与信息学院 南京211100
  • 出版日期:2018-12-01 发布日期:2018-12-01

Ciphertext-policy Attribute-based Encryption with Anonymous Access Structure

WANG Hai-ping and ZHAO Jing-jing   

  • Online:2018-12-01 Published:2018-12-01

摘要: 在密文策略的属性基加密方案中,用户的私钥与属性集合关联,密文与访问策略关联,当且仅当用户私钥中所包含的属性满足嵌入在密文中的访问策略时,用户方能成功解密该密文。在现有方案的解密过程中,访问策略连同密文被发送给解密者,这意味着加密者的隐私被泄露。为解决该问题,提出了具有隐藏访问策略的密文策略属性基加密方案,以保护加密者的隐私;并基于DBDH假设,证明了该方案在标准模型中是选择明文安全的。

关键词: 属性基加密,隐藏访问策略,DBDH假设,选择明文安全

Abstract: In ciphertext-policy attribute-based encryption(CP-ABE) scheme,a user’s secret key is associated with a set of attributes,and the ciphertext is associated with an access policy.The user can decrypt the ciphertext if and only if the attribute set embedded in his secret key satisfies the access policy specified in the ciphertext.In the present schemes,the access policy is sent to the decryptor along with the ciphertext,which means that the privacy of the encryptor is revealed.In order to solve such problem,we proposed a CP-ABE scheme with anonymous access policy,which is able to preserve the privacy of the encryptor.Our new scheme is proved to be selectively secure against chosen-plaintext attack under DBDH assumption in the standard model.

Key words: Attribute-based encryption,Anonymous access policy,DBDH assumption,Chosen-plaintext secure

[1] Sahai A,Waters B.Fuzzy identity-based encryption[C]∥Advances in Cryptology-EUROCRYPT 2005.Berlin:Springer Berlin Heidelberg,2005:457-473
[2] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥ Procee-ding of the 13th ACM Conference on Computer and Communications Security (ACM CSS 2006).New York:ACM New York,2006:89-98
[3] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]∥ IEEE Symposium on Security and Privacy 2007 (SP 2007).Piscataway:IEEE,2006:321-334
[4] Cheung L,Newport C.Provably secure ciphertext policy ABE[C]∥14th ACM Conference on Computer and Communications Security (ACM CSS 2007).New York:ACM,2007:456-465
[5] Lbraimi L,Tang Q,Hartel P,et al.Efficient and provably secure ciphertext-policy attribute-based encryption schemes[C]∥Information Security Practice and Experience.Berlin:Springer Berlin Heidelberg,2009:1-12
[6] Kapadia A,Tsang P P,Smith S W.Attribute-based publishingwith hidden credentials and hidden policies[C]∥Proceedings USA of 14th Annual Network & Distributed System Security Symposium (NDSS 2007).San Diego,California,USA:NDSS,2007:179-192
[7] Boneh D,Waters B.Conjunctive,subset,and range queries on encrypted data[C]∥4th Theory of Cryptography Conference.Berlin:Springer Berlin Heidelberg,2007:535-554
[8] Nishide T,Yoneyama K,Ohta K.Attribute-based encryptionwith partially hidden encryptor-specified access structures[C]∥6th International Conference on Applied Cryptography and Network Security.Berlin:Springer Berlin Heidelberg,2008:111-129
[9] Müller S,Katzenbeisser S.Hiding the policy in cryptographic access control[M]∥ Security and Trust Management.Berlin:Springer Berlin Heidelberg,2012:90-105
[10] Xu R,Wang Y,Lang B.A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing[C]∥2013 International Conference on Advanced Cloud and Big Data (CBD).Piscataway:IEEE,2013:51-57
[11] Lai J Z,Deng R H,Li Y J.Fully secure ciphertext-policy hiding CP-ABE[C]∥7th International Conference on Information Security Practice and Experience.Berlin:Springer Berlin Heidelberg,2011:24-39
[12] Waters B.Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions[C]∥Advances in Cryptology-CRYPTO 2009(009).Berlin:Springer Berlin Heidelberg,2011:619-636
[13] Emura K,Miyaji A,Nomura A,et al.A ciphertext-policy attri-bute-based encryption scheme with constant ciphertext length[C]∥5th International Conference on Information Security Practice and Experience.Berlin:Springer Berlin Heidelberg,2009:13-23
[14] Zhou Z B,Huang D J.On efficient ciphertext-policy attribute-based encryption and broadcast encryption extended abstract[C]∥ Proceedings of the 17th ACM Conference on Computer and Communications Security.New York:ACM,2010:753-755
[15] Rao Y S,Dutta R.Recipient anonymous ciphertext-policy attri-bute based encryption[C]∥9th Internatonal Conference on Information Systems Security.Berlin:Springer Berlin Heidelberg, 2013:329-344
[16] Zhang M,Wang X A,Yang X,et al.Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption[C]∥ 2013 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS).Piscataway:IEEE,2013:438-442
[17] Padhya M,Jinwala D.A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy[C]∥ 10th International Conference on Information Systems Security.Berlin:Springer Berlin Heidelberg,2014:167-184

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!