收藏本站
收藏 | 投稿 | 手机打开
二维码
手机客户端打开本文

Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing

CHEN Yanli  SONG Lingling  YANG Geng  
【摘要】:In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations.

知网文化
【相似文献】
中国期刊全文数据库 前20条
1 CHEN Yanli;SONG Lingling;YANG Geng;;Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing[J];中国通信;2016年02期
2 Kai ZHANG;Jianfeng MA;Jiajia LIU;Hui LI;;Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption[J];Science China(Information Sciences);2016年09期
3 Kai ZHANG;Hui LI;Jianfeng MA;Ximeng LIU;;Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability[J];Science China(Information Sciences);2018年03期
4 Zhihua Xia;Liangao Zhang;Dandan Liu;;Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing[J];中国通信;2016年07期
5 ;A more efficient accountable authority IBE scheme under the DL assumption[J];Science China(Information Sciences);2010年03期
6 ;ANONYMOUS OFF-LINE ELECTRONIC PAYMENT SYSTEM WITH MULTIPLE BANKS[J];Journal of Electronics(China);2001年04期
7 HUANG Qinlong;MA Zhaofeng;YANG Yixian;FU Jingyi;NIU Xinxin;;EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing[J];Chinese Journal of Electronics;2015年04期
8 WANG Jing;HUANG Chuanhe;YANG Kan;WANG Jinhai;WANG Xiaomao;CHEN Xi;;MAVP-FE:Multi-Authority Vector Policy Functional Encryption with Efficient Encryption and Decryption[J];中国通信;2015年06期
9 ;A distributed adaptive multi-hop certification authority schemefor mobile Ad Hoc networks[J];Journal of Systems Engineering and Electronics;2005年02期
10 Chia-Wei Tsai;Toung-Shang Wei;Tzonelih Hwang;;One-Way Quantum Authenticated Secure Communication Using Rotation Operation[J];Communications in Theoretical Physics;2011年12期
11 Xiehua Li;Yanlong Wang;Ming Xu;Yaping Cui;;Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage[J];中国通信;2018年02期
12 ;Short-ciphertext and BDH-based CCA2 secure certificateless encryption[J];Science China(Information Sciences);2010年10期
13 Cheol-Joo Chae;Kwang-Nam Choi;Kiseok Choi;Jae-Soo Kim;Yong Ju Shin;;Enhanced biometric encryption algorithm for private key protection in BioPKI system[J];Journal of Central South University;2014年11期
14 Qingsong ZHAO;Qingkai ZENG;Ximeng LIU;Huanliang XU;;Simulation-based security of function-hiding inner product encryption[J];Science China(Information Sciences);2018年04期
15 Li YANG;Chenmiao WU;Huiqin XIE;;Mutual authenticated quantum no-key encryption scheme over private quantum channel[J];Science China(Information Sciences);2018年02期
16 ZHENG MengCe;HU HongGang;;Cryptanalysis of Prime Power RSA with two private exponents[J];Science China(Information Sciences);2015年11期
17 ;Remarks on the bounds for cryptanalysis of low private key RSA[J];Progress in Natural Science;2009年10期
18 Liu Zhenhua;Kang Yaqian;Li Chen;Fan Yaqing;;Hybrid cloud approach for block-level deduplication and searchable encryption in large universe[J];The Journal of China Universities of Posts and Telecommunications;2017年05期
19 Feng WANG;Mingxing LUO;Huiran LI;Zhiguo QU;Xiaojun WANG;;Quantum private comparison based on quantum dense coding[J];Science China(Information Sciences);2016年11期
20 ZHU Yan;WANG Shanbiao;MA Di;FENG Rongquan;;Identity-Based Encryption on RSA Without Pairings and Key Escrow[J];Chinese Journal of Electronics;2014年04期
中国重要会议论文全文数据库 前4条
1 ;Design and Realization of A Cryptographic and Certificate Authority Center for User in VoIP System[A];2006北京地区高校研究生学术交流会——通信与信息技术会议论文集(上)[C];2006年
2 韩斐;秦静;;A function private attribute based encryption[A];第十一届全国博士生学术年会——信息技术与安全专题论文集[C];2013年
3 ;A New Communication Scheme for Threshold Certificate Authority in Ad Hoc Networks[A];Proceedings of the 1st Chinese Conference on Trusted Computing and Information Security[C];2004年
4 Zhang Xi;Yang Ling;;On the Security of An Identity Based Broadcast Encryption Scheme[A];proceedings of 2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010 no.2)[C];2012年
中国知网广告投放
 快捷付款方式  订购知网充值卡  订购热线  帮助中心
  • 400-819-9993
  • 010-62982499
  • 010-62783978