北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2018, Vol. 41 ›› Issue (3): 113-118.doi: 10.13190/j.jbupt.2017-220

• 研究报告 • 上一篇    

云计算环境下支持高效撤销的新型属性基加密方案

陈红松1,2, 沈强磊1   

  1. 1. 北京科技大学 计算机与通信工程学院, 北京 100083;
    2. 材料领域知识工程北京市重点实验室, 北京 100083
  • 收稿日期:2017-11-06 出版日期:2018-06-28 发布日期:2018-06-04
  • 作者简介:陈红松(1977-),男,副教授;沈强磊(1992-),男,硕士生,E-mail:chenhs@ustb.edu.cn.
  • 基金资助:
    中央高校基本科研业务费专项资金项目(FRF-GF-17-B27)

Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment

CHEN Hong-song1,2, SHEN Qiang-lei1   

  1. 1. School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China;
    2. Beijing Key Laboratory of Knowledge Engineering for Materials Science, Beijing, 100083, China
  • Received:2017-11-06 Online:2018-06-28 Published:2018-06-04

摘要: 为了解决开放云计算环境下用户属性变化导致的用户权限撤销及变更问题,提出一种基于代理重加密和密钥分割技术的属性基代理重加密方案,该方案支持用户权限的即时撤销,当发生用户撤销时,只需要更新云存储服务器中的密文组件以及代理服务器中未撤销用户的属性无关私钥组件.当发生用户属性撤销时,只需更新用户属性撤销列表,解密时根据用户属性撤销列表控制撤销属性用户的访问,可减少密文更新和用户私钥更新的计算量,提高系统撤销用户权限的执行效率,保护用户属性的隐私信息.

关键词: 属性基加密, 用户-属性撤销, 访问控制, 代理重加密

Abstract: In order to solve the problem of user authorization revocation caused by user attributes change in open cloud computing environment, an attribute-based proxy re-encryption scheme based on proxy re-encryption and key segmentation is proposed. Instant revocation of user authorization is supported in the scheme. When user revocation occurs, it is only necessary to update the ciphertext component in the cloud storage server and unrevoked users' attribute independence private key component in the proxy server. When the user attribute revocation occurs, it is necessary to update the user attribute revocation list from which the user authorization can be limited. Then the workload of updating ciphertext and the user private key is lessen to improve the execution efficiency of re-encryption and access control scheme, at the same time,the privacy information of user attributes are protected.

Key words: attribute-based encryption, user-attribute revocation, access control, proxy re-encryption

中图分类号: