信息网络安全 ›› 2020, Vol. 20 ›› Issue (8): 62-70.doi: 10.3969/j.issn.1671-1122.2020.08.008

• 技术研究 • 上一篇    下一篇

云环境下支持属性撤销的无密钥托管属性基加密方案

宋硕(), 张兴兰   

  1. 北京工业大学信息学部,北京 100124
  • 收稿日期:2020-05-13 出版日期:2020-08-10 发布日期:2020-10-20
  • 通讯作者: 宋硕 E-mail:18813157122@163.com
  • 作者简介:宋硕(1996—),女,山东,硕士研究生,主要研究方向为密码学和属性加密|张兴兰(1970—),女,山西,教授,博士,主要研究方向为密码学和安全协议等。
  • 基金资助:
    国家自然科学基金(61801008)

Attribute-based Encryption Scheme without Key Escrow Supporting Attribute Revocation in Cloud Environment

SONG Shuo(), ZHANG Xinglan   

  1. Department of Information, Beijing University of Technology, Beijing 100124, China
  • Received:2020-05-13 Online:2020-08-10 Published:2020-10-20
  • Contact: SONG Shuo E-mail:18813157122@163.com

摘要:

为解决ABE方案中存在的密钥托管问题和属性撤销的效率问题,文章提出支持解密外包和无密钥托管的属性基加密撤销方案。方案中,若用户的某个属性被撤销,属性权威首先根据最新的属性更新密钥生成同类复杂函数并广播给未撤销该属性的用户;然后用户利用同类复杂函数更新自己的密钥;最后属性权威根据属性更新密钥更新云服务器中的密文,实现属性撤销。该方案在属性撤销过程中减少了属性权威的计算量和通信量,同时利用半诚实的云服务器执行部分解密来减少用户的计算量,并引入中央权威和属性权威联合生成用户的密钥解决密钥托管问题。安全性证明和性能分析表明,该方案基于q-Parallel BDHE假设达到了标准模型下的选择明文安全,较同类方案具有更高的计算效率。

关键词: 属性撤销, 密钥托管, 解密外包, 同类复杂函数

Abstract:

In order to solve the problem of key escrow and the efficiency of attribute revocation in ABE, this paper proposes an attribute-based encryption revocation scheme that supports decryption outsourcing and no key escrow. In the scheme, if a user’s attribute is revoked, the attribute authority first generates a sibling intractable function based on the latest attribute update key and broadcasts it to users who have not revoked the attribute. Then the users update their own private key by using the sibling intractable function. Finally, the attribute authority updates the ciphertext in the cloud server according to the attribute update key to realize the attribute revocation. In the process of attribute revocation, this scheme reduces the computation and communication of the attribute authority, and uses semi-honest cloud server to perform partial decryption to reduce the computation of the user, and introduces the central authority and the attribute authority to jointly generate the user’s private key to solve the key escrow problem. The security proof and performance analysis show that, the scheme is based on the assumption of q-Parallel BDHE to achieve the chosen plaintext security under the standard model, which has higher computational efficiency than similar schemes.

Key words: attribute revocation, key escrow, decrypt outsourcing, sibling intractable function

中图分类号: