Journal on Communications ›› 2023, Vol. 44 ›› Issue (1): 75-88.doi: 10.11959/j.issn.1000-436x.2023019
• Papers • Previous Articles Next Articles
Yiliang HAN1,2, Kaiyang GUO1,2, Riming WU1,2, Kai LIU1,2
Revised:
2022-10-20
Online:
2023-01-25
Published:
2023-01-01
Supported by:
CLC Number:
Yiliang HAN, Kaiyang GUO, Riming WU, Kai LIU. Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice[J]. Journal on Communications, 2023, 44(1): 75-88.
[1] | SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2005: 457-473. |
[2] | GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM Press, 2006: 89-98. |
[3] | BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// Proceedings of IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2007: 321-334. |
[4] | WATERS B , . Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization[C]// Proceedings of International Workshop on Public Key Cryptography. Berlin:Springer, 2011: 53-70. |
[5] | IBRAIMI L , PETKOVIC M , NIKOVA S ,et al. Mediated ciphertext-policy attribute-based encryption and its application[C]// Proceedings of International Workshop on Information Security Applications. Berlin:Springer, 2009: 309-323. |
[6] | LI L , GU T L , CHANG L ,et al. A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram[J]. IEEE Access, 2017,5: 1137-1145. |
[7] | 孙京宇, 朱家玉, 田自强 ,等. 基于椭圆曲线加密且支持撤销的属性基加密方案[J]. 计算机应用, 2022,42(7): 2094-2103. |
SUN J Y , ZHU J Y , TIAN Z Q ,et al. Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation[J]. Journal of Computer Applications, 2022,42(7): 2094-2103. | |
[8] | 汪倩倩, 欧毓毅 . 可追踪且可撤销的基于 OBDD 访问结构的CP-ABE方案[J]. 计算机应用研究, 2021,38(4): 1185-1189. |
WANG Q Q , OU Y Y . Traceable and revocable CP-ABE scheme OBDD-based access structure[J]. Application Research of Computers, 2021,38(4): 1185-1189. | |
[9] | HINEK M J , JIANG S , SAFAVI-NAINI R ,et al. Attribute based encryption with key cloning protection[R]. 2008. |
[10] | LI J , REN K , KIM K . A2BE:accountable attribute-based encryption for abuse free access control[R]. 2009. |
[11] | LIU Z , CAO Z F , WONG D S . Blackbox traceable CP-ABE:how to catch people leaking their keys by selling decryption devices on ebay[C]// Proceedings of the 2013 ACM SIGSAC Conference on Computer & communications Security. New York:ACM Press, 2013: 475-486. |
[12] | LIU Z , CAO Z F , WONG D S . Traceable CP-ABE:how to trace decryption devices found in the wild[J]. IEEE Transactions on Information Forensics and Security, 2015,10(1): 55-68. |
[13] | LIU Z , CAO Z F , WONG D S . White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures[J]. IEEE Transactions on Information Forensics and Security, 2013,8(1): 76-88. |
[14] | 赵志远, 朱智强, 王建华 ,等. 云存储环境下无密钥托管可撤销属性基加密方案研究[J]. 电子与信息学报, 2018,40(1): 1-10. |
ZHAO Z Y , ZHU Z Q , WANG J H ,et al. Revocable attribute-based encryption with escrow-free in cloud storage[J]. Journal of Electronics& Information Technology, 2018,40(1): 1-10. | |
[15] | 闫玺玺, 何旭, 刘涛 ,等. 抗密钥委托滥用的可追踪属性基加密方案[J]. 通信学报, 2020,41(4): 150-161. |
YAN X X , HE X , LIU T ,et al. Traceable attribute-based encryption scheme with key-delegation abuse resistance[J]. Journal on Communications, 2020,41(4): 150-161. | |
[16] | AGRAWAL S , BOYEN X , VAIKUNTANATHAN V ,et al. Functional encryption for threshold functions (or fuzzy IBE) from lattices[C]// Proceedings of International Workshop on Public Key Cryptography. Berlin:Springer, 2012: 280-297. |
[17] | BOYEN X . Attribute-based functional encryption on lattices[M]. Berlin: Springer, 2013. |
[18] | WANG Y T . Lattice ciphertext policy attribute-based encryption in the standard model[J]. International Journal of Network Security, 2014,16(6): 444-451. |
[19] | SOO F T , SAMSUDIN A . Lattice ciphertext-policy attribute-based encryption from ring-LWE[C]// Proceedings of International Symposium on Technology Management and Emerging Technologies (ISTMET). Piscataway:IEEE Press, 2015: 258-262. |
[20] | 于金霞, 杨超超, 杨丽伟 ,等. 理想格上支持访问树的属性基加密方案[J]. 重庆邮电大学学报(自然科学版), 2019,31(1): 113-119. |
YU J X , YANG C C , YANG L W ,et al. Attribute-based encryption scheme supporting tree access structure on ideal lattices[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2019,31(1): 113-119. | |
[21] | 于金霞, 杨超超, 张棋超 ,等. 外包环境下格上可撤销的属性基加密方案[J]. 计算机科学与探索, 2020,14(2): 244-251. |
YU J X , YANG C C , ZHANG Q C ,et al. Revocable ciphertext-policy attribute-based encryption in data outsourcing systems from lattices[J]. Journal of Frontiers of Computer Science and Technology, 2020,14(2): 244-251. | |
[22] | 闫玺玺, 刘媛, 李子臣 ,等. 理想格上支持隐私保护的属性基加密方案[J]. 通信学报, 2018,39(3): 128-135. |
YAN X X , LIU Y , LI Z C ,et al. Privacy-preserving attribute-based encryption scheme on ideal lattices[J]. Journal on Communications, 2018,39(3): 128-135. | |
[23] | 郭凯阳, 韩益亮, 吴日铭 . 基于RLWE的可撤销分层属性加密方案[J]. 信息技术与网络安全, 2021,40(8): 9-16. |
GUO K Y , HAN Y L , WU R M . Revocable hierarchical attribute-based encryption scheme from RLWE[J]. Information Technology and Network Security, 2021,40(8): 9-16. | |
[24] | 王想, 陈燕俐 . 基于以太坊的格上属性基可搜索加密方案[J]. 重庆邮电大学学报(自然科学版), 2021,33(4): 675-682. |
WANG X , CHEN Y L . Attribute-based searchable encryption scheme from lattices on Ethereum[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2021,33(4): 675-682. | |
[25] | 闫玺玺, 刘媛, 李子臣 ,等. 利用LWE问题构造的多机构属性基加密方案[J]. 西安电子科技大学学报, 2018,45(4): 129-136. |
YAN X X , LIU Y , LI Z C ,et al. Multi-authority attribute-based encryption scheme from LWE problem[J]. Journal of Xidian University, 2018,45(4): 129-136. | |
[26] | 唐慧, 汪学明 . 基于格的多授权密文属性加密方案[J]. 计算机应用研究, 2022,39(2): 563-566,571. |
TANG H , WANG X M . Multi-authority ciphertext-policy attributed-based encryption scheme from lattice[J]. Application Research of Computers, 2022,39(2): 563-566,571. |
[1] | Xuejiao LIU, Tiancong CAO, Yingjie XIA. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture [J]. Journal on Communications, 2023, 44(3): 186-197. |
[2] | Ruizhong DU, Tianhe ZHANG, Pengliang SHI. Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing [J]. Journal on Communications, 2022, 43(6): 168-178. |
[3] | Xinchun YIN, Mengyu WANG, Jianting NING. Lightweight searchable medical data sharing scheme [J]. Journal on Communications, 2022, 43(5): 110-122. |
[4] | Haibo ZHANG, Hongwu HUANG, Kaijian LIU, Xiaofan HE. Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles [J]. Journal on Communications, 2021, 42(6): 213-225. |
[5] | Xixi YAN,Xu HE,Tao LIU,Qing YE,Jinxia YU,Yongli TANG. Traceable attribute-based encryption scheme with key-delegation abuse resistance [J]. Journal on Communications, 2020, 41(4): 150-161. |
[6] | Xixi YAN,Xiaohan YUAN,Yongli TANG,Yanli CHEN. Verifiable attribute-based searchable encryption scheme based on blockchain [J]. Journal on Communications, 2020, 41(2): 187-198. |
[7] | Rongna XIE, Hui LI, Guozhen SHI, Yunchuan GUO, Ming ZHANG, Xiuze DONG. Blockchain-based access control mechanism for data traceability [J]. Journal on Communications, 2020, 41(12): 82-93. |
[8] | FENG Chaosheng,LUO Wangping,QIN Zhiguang,YUAN Ding,ZOU Liping. Attribute-based proxy re-encryption scheme with multiple features [J]. Journal on Communications, 2019, 40(6): 177-189. |
[9] | Lei SUN,Zhiyuan ZHAO,Jianhua WANG,Zhiqiang ZHU. Attribute-based encryption scheme supporting attribute revocation in cloud storage environment [J]. Journal on Communications, 2019, 40(5): 47-56. |
[10] | Youliang TIAN,Kedi YANG,Zuan WANG,Tao FENG. Algorithm of blockchain data provenance based on ABE [J]. Journal on Communications, 2019, 40(11): 101-111. |
[11] | Jian LIU,Ming XIAN,Huimei WANG,Hong RONG. Optimization method for attribute-based cryptographic access control in mobile cloud computing [J]. Journal on Communications, 2018, 39(7): 39-49. |
[12] | Qi LI,Hongbo ZHU,Jinbo XIONG,Ruo MO. Multi-authority attribute-based access control system in mHealth with traceability [J]. Journal on Communications, 2018, 39(6): 1-10. |
[13] | Xin LIU,Qiuliang XU,Bin ZHANG,Bo ZHANG. k-times attribute-based authentication scheme using direct anonymous attestation [J]. Journal on Communications, 2018, 39(12): 113-133. |
[14] | Ruo MO,Jian-feng MA,Xi-meng LIU,Qi LI. Multi-authority ABS supporting dendritic access structure [J]. Journal on Communications, 2017, 38(7): 96-104. |
[15] | Yong-hui ZHENG,Yuan-ji KANG,Chun-xiang GU,Hui DONG. Attribute-based fully homomorphic encryption scheme over rings [J]. Journal on Communications, 2017, 38(4): 55-63. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|