计算机科学 ›› 2016, Vol. 43 ›› Issue (Z6): 357-360.doi: 10.11896/j.issn.1002-137X.2016.6A.085

• 信息安全 • 上一篇    下一篇

一种属性基加密方案的外包解密方法

丁晓红,秦敬源,王新   

  1. 大连海洋大学信息工程学院 大连116023,大连海洋大学信息工程学院 大连116023,大连海洋大学信息工程学院 大连116023
  • 出版日期:2018-11-14 发布日期:2018-11-14

Attribute-based Encryption Scheme with Outsourcing Decryption Method

DING Xiao-hong, QIN Jing-yuan and WANG Xin   

  • Online:2018-11-14 Published:2018-11-14

摘要: Sahai和Waters提出的属性基加密(Attribute-Based Encryption,ABE)能够实现一对多加密,因而具有广泛的应用价值。随着云计算技术的不断发展,云计算也与属性基加密有了紧密的联系。将快速高效的外包技术应用在属性基解密算法中。在云计算中,云服务器存储了客户的密文。当客户对远程数据进行解密时,解密者将转换密钥上传给云服务器。云服务器利用转换密钥将密文转换成一个中间密文并发送给客户,客户解密中间密文并获得明文的计算量很小,从而减轻了解密者的负担。安全性分析和效率分析证明所提出的方法是安全的和高效的。

关键词: 属性基加密,数据外包,快速解密

Abstract: Sahai and Waters proposed ABE (Attribute-based Encryption) which realizes one to more encryption.ABE has extensive application value.With the continuous development of cloud computing,cloud computing is also closely linked with attribute based encryption.This paper applied the rapid and efficient outsourcing computation technique into ABE decryption algorithm.In cloud computing,the cloud server stores the clients’ ciphertexts.When the client decrypts its remote data,the decryptor uploads the transform key to the cloud server.By using the transform key,the cloud server transforms the ciphertext into semi-ciphertext and sends it to client.The client decrypts the semi-ciphertext and gets the plaintext.This outsourcing computation technique saves the clients’ computation overhead.Through security analysis and efficiency analysis,our proposed scheme is secure and efficient.

Key words: Attribute-based encryption,Outsourcing,Fast decryption

[1] Sahai A,Waters B.Fuzzy identity-based encryption[M]∥Cramer R,ed.EUROCRYPT 2005.Springer,Heidelberg,2005:457-473
[2] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine grained access control of encrypted data[C]∥ ACM Conference on Computer and Communications Security.2006:89-98
[3] Waters B.Ciphertext-Policy Attribute-Baded Encryption:An Ex-pressive,Efficient,and Provably Secure Realization[C]∥Public Key Cryptography(PKC 2011).2011:53-70
[4] 马丹丹,陈勤,党正芹,等.基于多属性机构的密文策略和加密机制[J].计算机工程,2012,38(10):114-116
[5] Lai Lun-zuo,Deng R H,Guan Chao-wen, et al.Attribute-Based Encryption With Verifiable Outsourced Decryption[J].IEEE Transactions on Information Forensics and Security,2013,8(8):1343-1354
[6] Green M,Hohenberger S,Waters B.Outsourcing the Decryption of ABE Ciphertexts[C]∥Proceedings of the 20th USENIX Conference on Security.2011
[7] Gamal T E.A public key encryptosystem and a signature scheme- based on discrete logarithms[M]∥ Advances in Cryptology:Proceedings of CRYPTO 84.1985:10-18
[8] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥ACM Conference on Computer and Communications Security.2006:89-98
[9] 石岳蓉,郭俊,赵晶晶,等.高效数据外包的基于多授权中心的ABE方案[J].信息技术,2015(2):97-100
[10] Beimel A.Secure Schemes for Secret Sharing and Key Distribution [D].Israel Institute of Technology,Technion,Haifa,Is-rael,1996

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!