Journal on Communications ›› 2019, Vol. 40 ›› Issue (6): 177-189.doi: 10.11959/j.issn.1000-436x.2019127
• Correspondences • Previous Articles Next Articles
FENG Chaosheng1,2,LUO Wangping1,QIN Zhiguang2,YUAN Ding1,ZOU Liping1
Revised:
2019-05-19
Online:
2019-06-25
Published:
2019-07-04
Supported by:
CLC Number:
FENG Chaosheng,LUO Wangping,QIN Zhiguang,YUAN Ding,ZOU Liping. Attribute-based proxy re-encryption scheme with multiple features[J]. Journal on Communications, 2019, 40(6): 177-189.
"
方案 | 访问结构 | 单向性 | 非交互性 | 可重复性 | 可控性 | 可验证性 | 安全性 |
文献[ | AND门 | √ | √ | √ | × | × | sCPA |
文献[ | LSSS | √ | √ | × | × | × | sCCA |
文献[ | LSSS | √ | √ | × | × | × | CCA |
文献[ | AND门 | √ | √ | √ | √ | × | sCPA |
文献[ | 访问树 | √ | √ | √ | √ | × | sCCA |
文献[ | LSSS | √ | √ | × | × | × | CPA |
文献[ | BLSS[ | √ | √ | √ | × | × | CPA |
文献[ | AND门 | √ | √ | √ | √ | × | sCPA |
文献[ | AND门 | √ | √ | √ | √ | × | sCPA |
文献[ | AND门 | √ | √ | √ | × | × | sCPA |
本文方案 | LISS | √ | √ | √ | √ | √ | sCPA |
"
方案 | 加密 | 生成重加密密钥 | 原始密文解密 | 重加密密文解密 |
文献[ | (1+4NP)EG+ET | — | (2NP-2)ET+(1+2NP)B | — |
文献[ | (2+N)EG+ET | (3+3N)EG+ET | (1+N)B | EG+(2+N)B |
文献[ | (3+4NP)EG+2ET | (6+4NP+NS)EG+2ET | (2+3NP)EG+(1+NP)ET+(7+3NP)B | 4EG+(3+NP)ET+(3+2NP)B |
文献[ | (5+3 NP)EG+ET+|OTS| | (14+3 NP+2 NS)EG+ET+|OTS| | (1+2 NP)EG+NPET+(10+3 NP)B+|OTS| | (2+6 NP)EG+1 ET+(16+6 NP)B+2|OTS|+|SYM| |
文献[ | (2+N)EG+ET | (4+N)EG+ET | (1+2N)B | ET+(2+2N)B |
文献[ | (4+NP)EG+ET | (8+2NP+NS)EG+3ET | EG+(5+NP)B | 2EG+(8+NP)B |
文献[ | (1+NP)EG+ET | (4+NP)EG+ET | (1+NP)B | EG+(2+NP)B |
文献[ | (3+3N)EG+2ET | (6+3N)EG+2ET | (3+3N)B | ET+(4+3N)B |
文献[ | (6+4N)EG+2ET | (8+4N)EG+2ET | (6+3N)B | ET+(7+3N)B |
文献[ | (2+12 N)EG+ET | (2+25 N)EG+ET | (2+4N)B | (3+4N)B |
本文方案 | (7+NP)EG+ET | (10+NP)EG+ET | 3ET | 4ET+B |
"
方案 | 私钥 | 原始密文 | 重加密密文 |
文献[ | (1+2NS)|G| | |GT|+(1+2NP)|G| | — |
文献[ | (1+2N)|G| | |GT|+(2+N)|G| | 3|GT|+(3+N)|G| |
文献[ | (2+NS)|G| | 2k+(3+2NP)|G| | 4k+(6+4NP)|G| |
文献[ | (3+NS)|G| | |GT|+(4+2NP)|G|+|σ| | |GT|+(3+2NP)|G|+|σ|+|SYM| |
文献[ | (1+4N)|G| | |GT|+(2+N)|G| | 3|GT|+(3+N)|G| |
文献[ | (1+NS)|G| | |GT|+(3+NP)|G| | 4|GT|+(7+2NP)|G| |
文献[ | (1+NS)|G| | |GT|+(1+NP)|G| | 2|GT|+(2+NP)|G| |
文献[ | (4+4N)|G| | 2|GT|+(3+3N)|G| | 4|GT|+(4+3N)|G| |
文献[ | (7+3N)|G| | 2|GT|+(5+3N)|G| | 4|GT|+(6+3N)|G| |
文献[ | (2+4N)|G| | |GT|+(2+12N)|G| | 3|GT|+(4+12 N)|G| |
本文方案 | (4+2NS)|G| | |GT|+(5+2NP)|G| | 3|GT|+(7+2NP)|G| |
[1] | BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// The 2007 IEEE Symposium on Security and Privacy. IEEE, 2007: 321-334. |
[2] | 冯朝胜, 秦志光, 袁丁 . 云数据安全存储技术[J]. 计算机学报, 2015,38(1): 150-163. |
FENG C S , QIN Z G , YUAN D . Techniques of secure storage for cloud data[J]. Chinese Journal of Computers, 2015,38(1): 150-163. | |
[3] | 冯朝胜, 秦志光, 袁丁 ,等. 云计算环境下访问控制关键技术[J]. 电子学报, 2015,43(2): 312-319. |
FENG C S , QIN Z G , YUAN D ,et al. Key techniques of access control for cloud computing[J]. Acta Electronica Sinica, 2015,43(2): 312-319. | |
[4] | ATENIESE G , FU K , GREEN M ,et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security, 2006,9(1): 1-30. |
[5] | GREEN M , ATENIESE G . Identity-based proxy re-encryption[C]// The 5th International Conference on Applied Cryptography and Network Security. Springer, 2007: 288-306. |
[6] | THORBEK R , . Linear integer secret sharing and distributed exponentiation[C]// The 9th International Conference on Theory and Practice of Public-Key Cryptography. Springer, 2006: 75-90. |
[7] | BEIMEL A . Secure schemes for secret sharing and key distribution[D]. Haifa:Israel Institute of Technology, 1996. |
[8] | KARCHMER M , WIGDERSON A . On span programs[C]// The Eighth Annual Structure in Complexity Theory. IEEE, 1993: 102-111. |
[9] | WATERS B , . Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]// The 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography. Springer, 2011: 53-70. |
[10] | BALU A , KUPPUSAMY K . An expressive and provably secure ciphertext-policy attribute-based encryption[J]. Information Sciences, 2014,276(4): 354-362. |
[11] | CANETTI R , HALEVI S , KATZ J . Chosen-ciphertext security from identity- based encryption[C]// The Advances in Cryptology Eurocrypt. Springer, 2004: 207-222. |
[12] | LING C , NEWPORT C . Provably secure ciphertext policy abe[C]// The 14th ACM Conference on Computer and Communications Security. ACM, 2007: 456-465. |
[13] | ZHAO J , FENG D G , ZHANG Z F . Attribute-based conditional proxy re-encryption with chosen-ciphertext security[C]// The Global Telecommunications Conference. IEEE, 2010: 1-6. |
[14] | LIANG X H , CAO Z F , LIN H ,et al. Attribute based proxy re-encryption with delegating capabilities[C]// The 4th International Symposium on Information,Computer,and Communications Security. ACM, 2009: 276-286. |
[15] | LIANG K T , FANG L M , WONG D S ,et al. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security[C]// The 5th International Conference on Intelligent Networking and Collaborative Systems. IEEE, 2013: 552-559. |
[16] | LIANG K T , AU M H , LIU J K ,et al. A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing[J]. Future Generation Computers Systems, 2015,52(C): 95-108. |
[17] | LUO S , HU J B , CHEN Z . Ciphertext policy attribute-based proxy re-encryption[J]. Information & Communications Security, 2010,6476(4): 401-415. |
[18] | LI J J , LIU Z H , ZU L H . Chosen-ciphertext secure multi-use unidirectional attribute-based proxy re-encryptions[C]// The Ninth Asia Joint Conference on Information Security. IEEE, 2015: 96-103. |
[19] | LUAN I , TANG Q , HARTEL P ,et al. Efficient and provable secure ciphertext-policy attribute-based encryption schemes[C]// The 5th International Conference on Information Security Practice and Experience. Springer, 2009: 1-12. |
[20] | KAWAI Y , . Outsourcing the re-encryption key generation:flexible ciphertext-policy attribute-based proxy re-encryption[C]// The Information Security Practice and Experience. Springer, 2015: 301-315. |
[21] | FU X B . Unidirectional proxy re-encryption for access structure transformation in attribute-based encryption schemes[J]. International Journal of Network Security, 2015,17(2): 142-149. |
[22] | ZHANG Y H , LI J , CHEN X F ,et al. Anonymous attribute-based proxy re-encryption for access control in cloud computing[J]. Security& Communication Networks, 2016,9(14): 2397-2411. |
[23] | YIN H J , ZHANG L Y . Security analysis and improvement of an anonymous attribute-based proxy re-encryption[C]// The International Conference on Security,Privacy and Anonymity in Computation,Communication and Storage. Springer, 2017: 344-352. |
[24] | SEPEHRI M , TROMBETTA A . Secure and efficient data sharing with attribute-based proxy re-encryption scheme[C]// The 12th International Conference on Availability,Reliability and Security. ACM, 2017: 1-63. |
[25] | MA H , ZHANG R , WAN Z G ,et al. Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing[J]. IEEE Transactions on Dependable & Secure Computing, 2017,14(4): 679-692. |
[26] | XIONG H , SUN J F . Comments on “verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing”[J]. IEEE Transactions on Dependable & Secure Computing, 2017,14(4): 461-462. |
[27] | FENG X Y , LI C , LI D ,et al. Fully secure hidden ciphertext policyattribute-based proxy re-encryption[C]// The International Conference on Information and Communications Security. Springer, 2017: 192-204. |
[28] | GE C , SUSILO W , FANG L ,et al. A cca-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system[J]. Designs Codes & Cryptography, 2018(1): 1-17. |
[29] | YANG Y J , ZHU H Y , LU H B ,et al. Cloud based data sharing with fine-grained proxy re-encryption[J]. Pervasive and Mobile Computing, 2016,28(C): 122-134. |
[30] | XU P , CHEN H W , ZOU D Q ,et al. Fine-grained and heterogeneous proxy re-encryption for secure cloud storage[J]. Chinese Science Bulletin, 2014,59(32): 4201-4209. |
[31] | HUANG Q L , MA Z F , YANG Y X ,et al. Improving security and efficiency for encrypted data sharing in online social networks[J]. China Communications, 2014,11(3): 104-117. |
[32] | BENALOH J , LEICHTER J . Generalized secret sharing and monotone functions[C]// Advances in Cryptology. Springer, 1990: 27-35. |
[33] | GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts[C]// The 20th Usenix Conference on Security. USENIX Association, 2011:34. |
[1] | Xuejiao LIU, Tiancong CAO, Yingjie XIA. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture [J]. Journal on Communications, 2023, 44(3): 186-197. |
[2] | Yiliang HAN, Kaiyang GUO, Riming WU, Kai LIU. Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice [J]. Journal on Communications, 2023, 44(1): 75-88. |
[3] | Ruizhong DU, Tianhe ZHANG, Pengliang SHI. Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing [J]. Journal on Communications, 2022, 43(6): 168-178. |
[4] | Xinchun YIN, Mengyu WANG, Jianting NING. Lightweight searchable medical data sharing scheme [J]. Journal on Communications, 2022, 43(5): 110-122. |
[5] | Ruiqi LI, Chunfu JIA, Yafei WANG. Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application [J]. Journal on Communications, 2021, 42(3): 11-22. |
[6] | Xiaodong YANG, Wanting XI, Jiaqi WANG, Aijia CHEN, Caifen WANG. Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain [J]. Journal on Communications, 2021, 42(12): 236-246. |
[7] | Shufen NIU,Wenke LIU,Lixia CHEN,Caifen WANG,Xiaoni DU. Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain [J]. Journal on Communications, 2020, 41(8): 204-214. |
[8] | Yingying LI,Jianfeng MA,Yinbin MIAO. Encrypted image retrieval in multi-key settings based on edge computing [J]. Journal on Communications, 2020, 41(4): 14-26. |
[9] | Xixi YAN,Xu HE,Tao LIU,Qing YE,Jinxia YU,Yongli TANG. Traceable attribute-based encryption scheme with key-delegation abuse resistance [J]. Journal on Communications, 2020, 41(4): 150-161. |
[10] | Xixi YAN,Xiaohan YUAN,Yongli TANG,Yanli CHEN. Verifiable attribute-based searchable encryption scheme based on blockchain [J]. Journal on Communications, 2020, 41(2): 187-198. |
[11] | Lei SUN,Zhiyuan ZHAO,Jianhua WANG,Zhiqiang ZHU. Attribute-based encryption scheme supporting attribute revocation in cloud storage environment [J]. Journal on Communications, 2019, 40(5): 47-56. |
[12] | Youliang TIAN,Kedi YANG,Zuan WANG,Tao FENG. Algorithm of blockchain data provenance based on ABE [J]. Journal on Communications, 2019, 40(11): 101-111. |
[13] | Jian LIU,Ming XIAN,Huimei WANG,Hong RONG. Optimization method for attribute-based cryptographic access control in mobile cloud computing [J]. Journal on Communications, 2018, 39(7): 39-49. |
[14] | Qi LI,Hongbo ZHU,Jinbo XIONG,Ruo MO. Multi-authority attribute-based access control system in mHealth with traceability [J]. Journal on Communications, 2018, 39(6): 1-10. |
[15] | Mang SU,Yan YU,Bin WU,Anmin FU. Research on the programming language for proxy re-encryption [J]. Journal on Communications, 2018, 39(6): 89-97. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|