通信学报 ›› 2020, Vol. 41 ›› Issue (4): 150-161.doi: 10.11959/j.issn.1000-436x.2020016

• 学术论文 • 上一篇    下一篇

抗密钥委托滥用的可追踪属性基加密方案

闫玺玺,何旭,刘涛,叶青,于金霞,汤永利   

  1. 河南理工大学计算机科学与技术学院,河南 焦作 454003
  • 修回日期:2019-12-18 出版日期:2020-04-25 发布日期:2020-04-30
  • 作者简介:闫玺玺(1985- ),女,河南灵宝人,博士,河南理工大学副教授,主要研究方向为网络与信息安全、数字版权管理、数字内容安全|何旭(1993- ),男,河北冀州人,河南理工大学硕士生,主要研究方向为网络与信息安全、密码学|刘涛(1994- ),男,河南商丘人,河南理工大学硕士生,主要研究方向为网络与信息安全、软件定义网络|叶青(1981- ),女,辽宁营口人,博士,河南理工大学讲师,主要研究方向为信息安全、格密码学、数字签名|于金霞(1974- ),女,河南博爱人,博士,河南理工大学教授,主要研究方向为网络与信息安全、人工智能、智能信息处理|汤永利(1972- ),男,河南孟州人,博士,河南理工大学教授,主要研究方向为网络与信息安全、密码学
  • 基金资助:
    国家自然科学基金资助项目(61802117);“十三五”国家密码发展基金资助项目(MMJJ20170122);河南省科技攻关基金资助项目(192102210280);河南省高校科技创新团队基金资助项目(20IRTSTHN013);河南理工大学创新型科研团队基金资助项目(T2018-1)

Traceable attribute-based encryption scheme with key-delegation abuse resistance

Xixi YAN,Xu HE,Tao LIU,Qing YE,Jinxia YU,Yongli TANG   

  1. School of Computer Science and Technology,Henan Polytechnic University,Jiaozuo 454003,China
  • Revised:2019-12-18 Online:2020-04-25 Published:2020-04-30
  • Supported by:
    The National Natural Science Foundation of China(61802117);The “13th Five-Year” National Crypto Development Foundation(MMJJ20170122);Projects of Henan Provincial Department of Science and Technology(192102210280);The Innovative Scientists and Technicians Team of Henan Provincial High Education(20IRTSTHN013);The Innovative Research Team of Henan Polytechnic University(T2018-1)

摘要:

针对可追踪属性基加密方案利用追踪功能解决密钥委托滥用问题的不完备性,提出了一种抗密钥委托滥用的可追踪属性基加密方案。将秘密参数分享给用户私钥中关联属性的全部组件,使解密过程必须由全部组件共同参与完成,仅由用户私钥的一部分不能进行解密操作,从而实现真正的抗密钥委托滥用。利用一种短签名技术保护用户私钥中的追踪参数,防止追踪参数被伪造,从而获得对用户的追踪能力。同时支持抗密钥委托滥用和可追踪增强了所提方案的安全性。与相关方案的对比分析表明,所提方案在参数尺寸和计算代价上具有更好的性能优势。

关键词: 属性基加密, 抗密钥委托滥用, 白盒, 可追踪性

Abstract:

Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.

Key words: attribute-based encryption, key-delegation abuse resistance, white-box, traceability

中图分类号: 

No Suggested Reading articles found!