网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (10): 58-76.doi: 10.11959/j.issn.2096-109x.2016.00104

• 学术论文 • 上一篇    

Server-aided access control for cloud computing

WENG Jian(),WENG Jia-si,LIUJia-nan,HOU Lin   

  1. College of Information Science and Technology,Jinan University,Guangzhou 510632,China
  • 修回日期:2016-08-23 出版日期:2016-10-01 发布日期:2020-03-17
  • 作者简介:WENG Jian(1976-),born in Guangdong.In 2008,he received his Ph.D.degree in Computer Science and Engineering from Shanghai Jiaotong University.Currently,he is a professor and vice dean with the School of Information Technology,Jinan University.His research interests include cryptography and information security.|WENG Jiasi(1994-),born in Guangdong.She is a master in Jinan University.Her research interests include cryptography and information security.|LIU Jianan(1992-),born in Henan.He is a Ph.D student in Jinan University.His research interests include cryptography and information security.|HOU Lin (1991-),born in Hubei.She is a Ph.D student in Jinnan University.Her research interests include cryptography and information security.
  • 基金资助:
    The National Natural Science Foundation of China(61272413);The National Natural Science Foundation of China(61472165)

  • Revised:2016-08-23 Online:2016-10-01 Published:2020-03-17

摘要:

With the massive diffusion of cloud computing,more and more sensitive data is being centralized into the cloud for sharing,which brings forth new challenges for the security and privacy of outsourced data.To address these challenges,the server-aided access control (SAAC) system was proposed.The SAAC system builds upon a variant of conditional proxy re-encryption (CPRE) named threshold conditional proxy re-encryption (TCPRE).In TCPRE,t out of n proxies can re-encrypt ciphertexts (satisfying some specified conditions) for the delegator (while up to t?1 proxies cannot),and the correctness of the re-encrypted ciphertexts can be publicly verified.Both features guarantee the trust and reliability on the proxies deployed in the SAAC system.The security models for TCPRE were formalized,several TCPRE constructions were proposed and that our final scheme was secure against chosen-ciphertext attacks was proved.

关键词: threshold conditional proxy re-encryption, server-aided access control, cloud computing, chosen-ciphertext attack

No Suggested Reading articles found!