通信学报 ›› 2016, Vol. 37 ›› Issue (1): 76-87.doi: 10.11959/j.issn.1000-436x.2016009

• 学术论文 • 上一篇    下一篇

适应性安全的可追踪叛徒的基于属性加密方案

马海英1,曾国荪2,陈建平1,王金华3,王占君3   

  1. 1 南通大学计算机科学与技术学院,江苏 南通 226019
    2 同济大学计算机科学与技术系,上海 201804
    3 南通大学理学院,江苏 南通 226007
  • 出版日期:2016-01-25 发布日期:2016-01-27
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;NSFC-微软亚洲研究院联合基金资助项目;上海市优秀学科带头人计划基金资助项目;教育部博士点基金资助项目;上海自然科学基金资助项目;南通大学校级自然科学基金资助项目

Adaptively secure attribute-based encryption for traitor tracing

ying MAHai1,sun ZENGGuo2,ping CHENJian1,hua WANGJin3,jun WANGZhan3   

  1. 1 College of Computer Science and Technology,Nantong University,Nantong 226019,China
    2 Department of Computer Science and Technology,Tongji University,Shanghai 201804,China
    3 School of Science,Nantong University,Nantong 226007,China
  • Online:2016-01-25 Published:2016-01-27
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Joint of NSFC and Microsoft Asia Research;The Program of Shanghai Subject Chief Scientist;The Ph.D Programs Foundation of Ministry of Education China;Shanghai Natural Science Foundation Program;The Natural Science Foundation of Nan tong University

摘要:

针对基于属性加密(ABE,attribute-base encryption)机制存在的密钥滥用问题,为每个用户增加唯一的身份标识符,将联合安全编码和叛徒追踪机制引入到ABE方案中,给出适应性安全的可追踪叛徒ABE的定义、安全模型和可追踪模型,提出一种适应性安全的可追踪叛徒的ABTT方案,该方案允许适应性追踪指定策略盗版解码器中的叛徒。基于合数阶群上的子群判定假设和 DDH 假设,证明所提方案是适应性安全和适应性可追踪的。因此,所提方案不仅可以适应性追查指定策略盗版解码器中的叛徒,而且进一步增强了 ABE 系统的安全性,具有一定的理论和应用价值。

关键词: 基于属性加密, 叛徒追踪, 双系统加密, 适应性安全, 联合安全编码

Abstract:

For the key abuse problem in attribute-based encryption (ABE),each user was identified by his unique identity, and the collusion secure codes and the traitor tracing mechanism were introduced to the ABE scheme. The definition,security model and tracing model for adaptively secure attribute-based encryption for traitor tracing (ABTT)were forma-lized,and an adaptively secure ABTT scheme was proposed,which may trace traitors in policy-specific pirate decorders. Under these subgroup decision assumptions in composite groups and the DDH assumption,adaptively secure and can adaptively trace traitors were proved. Therefore, the scheme not only was capable of tracing adaptively traitors in policy-specific pirate decorders,but also further strengthens the security of ABE system,which has theoretical and prac-tical values.

Key words: attribute-based encryption, traitor tracing, dual system encryption, adaptive security, collusion secure code

No Suggested Reading articles found!