通信学报 ›› 2023, Vol. 44 ›› Issue (1): 75-88.doi: 10.11959/j.issn.1000-436x.2023019

• 学术论文 • 上一篇    下一篇

格上基于OBDD访问结构的抗密钥滥用属性加密方案

韩益亮1,2, 郭凯阳1,2, 吴日铭1,2, 刘凯1,2   

  1. 1 武警工程大学密码工程学院,陕西 西安 710086
    2 武警部队密码与信息安全保密重点实验室,陕西 西安 710086
  • 修回日期:2022-10-20 出版日期:2023-01-25 发布日期:2023-01-01
  • 作者简介:韩益亮(1977- ),男,甘肃会宁人,博士,武警工程大学教授、博士生导师,主要研究方向为公钥密码学、网络安全等
    郭凯阳(1995- ),男,河北邯郸人,武警工程大学硕士生,主要研究方向为密码学
    吴日铭(1994- ),男,江西赣州人,武警工程大学硕士生,主要研究方向为信息安全
    刘凯(1997- ),男,河南南阳人,武警工程大学硕士生,主研究方向为信息安全
  • 基金资助:
    国家自然科学基金资助项目(61572521);陕西省自然科学基础研究计划基金资助项目(2021-JM252)

Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice

Yiliang HAN1,2, Kaiyang GUO1,2, Riming WU1,2, Kai LIU1,2   

  1. 1 College of Cryptographic Engineering, Engineering University of PAP, Xi’an 710086, China
    2 Key Laboratory of PAP for Cryptology and Information Security, Xi’an 710086, China
  • Revised:2022-10-20 Online:2023-01-25 Published:2023-01-01
  • Supported by:
    The National Natural Science Foundation of China(61572521);Basic Research Program of Natural Science in Shaanxi Province(2021-JM252)

摘要:

为了解决属性加密中的密钥安全问题,基于环上误差学习(RLWE)和有序二元决策图(OBDD)访问结构提出了一种抗密钥滥用的密文策略属性加密方案。首先,构造了2个不同的机构来共同生成用户的私钥,降低了机构泄露密钥的风险;其次,在每个私钥中嵌入了用户的特定信息,实现了密钥的可追踪性,并通过维护白名单避免了非法用户和恶意用户的访问。另外,所提方案采用有序二元决策图的访问结构,在支持属性与、或、门限操作的基础上增加了属性的正负值。分析表明,所提方案满足抗合谋攻击和选择明文攻击下的不可区分性安全,降低了存储和计算开销,和其他方案相比更具有实用性。

关键词: 属性加密, 抗密钥委托滥用, 可追踪性, 访问结构

Abstract:

In order to solve the key security problem in attribute-based encryption, a ciphertext policy attribute-based encryption scheme against key abuse was proposed based on the ring learning with error over ring and the access structure of ordered binary decision diagram.Firstly, two different institutions were constructed to jointly generate the user’s secret key, which reduced the risk of key disclosure by institutions.Secondly, the user’s specific information was embedded in each secret key to realize the traceability of the key, and the access of illegal users and malicious users were avoided by maintaining the white list.In addition, the access structure of ordered binary decision diagram was adopted by the proposed scheme, and the positive and negative values of attributes on the basis of supporting attribute AND, OR and Threshold operation were increased.Analysis shows that the proposed scheme meets the distinguishable security of anti-collusion attack and chosen-plaintext attack, reduces the storage and computing overhead, and it is more practical than other schemes.

Key words: attribute-based encryption, key-delegation abuse resistance, traceability, access structure

中图分类号: 

No Suggested Reading articles found!