计算机科学 ›› 2025, Vol. 52 ›› Issue (9): 388-395.doi: 10.11896/jsjkx.240700066
李莉1, 陈介2, 朱江文3
LI Li1, CHEN Jie2, ZHU Jiangwen3
摘要: 在数据安全保护与共享领域,密文策略属性基加密(CP-ABE)被认为是一种在保护数据保密性的同时,允许数据被分享给经过授权的访问者的方法。然而,用户的属性不是一成不变的,因此数据访问者的权限可能发生变化,一种实用的方法是数据所有者重新加密密文并将其上传到服务器,以确保被撤销的用户无法再次访问数据,但这种做法给服务器带来了较大的负担。为了解决这一问题,提出了一种无需更新云端密文的支持用户级和属性级撤销的CP-ABE方案,通过代理服务器对密文进行重加密和预解密,管理各用户的预解密密钥,撤销时只需更新预解密密钥。实验结果表明,在多属性权威机构的条件下,在无需更新云端密文的情况下即可实现细粒度的属性撤销,并且具有前向安全性,相较于同类方案具有较小的计算开销和密钥存储开销。在q-BDHE困难性问题下提供了安全性证明,证明该方案对选择明文攻击具有不可区分性。
中图分类号:
[1]SAHAI A,WATERS B.Fuzzy identity-based encryption[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,2005:457-473. [2]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//2007 IEEE Symposium on Security and Privacy(SP’07).IEEE,2007:321-334. [3]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.2006:89-98. [4]YAN X,NI H,LIU Y,et al.Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR[J].Computer Science and Information Systems,2019,16(3):831-847. [5]ATTRAPADUNG N,IMAI H.Conjunctive broadcast and attribute-based encryption[C]//International Conference on Pairing-based Cryptography.Berlin:Springer,2009:248-265. [6]WANG P P,FENG D G,ZHANG L W.CP-ABE Scheme Supporting Fully Fine-Grained Attribute Revocation[J].Journal of Software,2012,23(10):2805-2816. [7]DAS S,NAMASUDRA S.MACPABE:Multi-Authority-basedCP-ABE with efficient attribute revocation for IoT-enabled healthcare infrastructure[J].International Journal of Network Management,2023,33(3):e2200. [8]LIU J K,YUEN T H,ZHANG P,et al.Time-Based Direct Re-vocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List[C]//Applied Cryptography and Network Security.Cham:Springer,2018:516-534. [9]LIU Y L,XU S W,YUE Z Y.A Lightweight CP-ABE Schemewith Direct Attribute Revocation for Vehicular Ad Hoc Network[J].Entropy,2023,25(7):979. [10]JIANG Y,SUSILO W,MU Y,et al.Ciphertext-policy attribute-based encryption with hidden access policy[J].Mobile Networks and Applications,2018,23(4):840-854. [11]WEI J H,CHEN X F,HUANG X X,et al.RS-HABE:Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud[J].IEEE Transactions on Dependable and Secure Computing,2019,18(5):2301-2315. [12]GUO L F,XING X M,GUO H.An efficient traceable and revocable attribute-based encryption scheme in cloud storage[J].Journal of Cryptologic Research,2023,10(1):131-145. [13]ZHOU X B,JIANG R.A fine-grained data encryption and sharing scheme in fog and cloud computing environments[J].Journal of Cryptologic Research,2023,10(6):1295-1318. |
|