信息网络安全 ›› 2019, Vol. 19 ›› Issue (9): 76-80.doi: 10.3969/j.issn.1671-1122.2019.09.016
王生玉1, 汪金苗2,3, 董清风2,3, 朱瑞瑾4
收稿日期:
2019-07-15
出版日期:
2019-09-10
发布日期:
2020-05-11
作者简介:
作者简介:王生玉(1980—),男,青海,本科,主要研究方向为网络安全管理;汪金苗(1987—),女,山东,博士,主要研究方向为数据安全与访问控制;董清风(1977—),男,湖北,硕士,主要研究方向为机器学习;朱瑞瑾(1985—),男,山东,博士,主要研究方向为二进制安全。
基金资助:
Shengyu WANG1, Jinmiao WANG2,3, Qingfeng DONG2,3, Ruijin ZHU4
Received:
2019-07-15
Online:
2019-09-10
Published:
2020-05-11
摘要:
经典的ABE方案在效率、安全性等方面存在一定的缺陷,针对这些问题,研究者从不同方面对经典ABE进行扩展,使其能够满足不同的应用需求。文章首先介绍了ABE的基本机制,然后从效率提升、策略隐藏、权限撤销、安全性增强等方面对ABE的研究进展进行了探讨,最后对未来可能的研究方向进行了展望。
中图分类号:
王生玉, 汪金苗, 董清风, 朱瑞瑾. 基于属性加密技术研究综述[J]. 信息网络安全, 2019, 19(9): 76-80.
Shengyu WANG, Jinmiao WANG, Qingfeng DONG, Ruijin ZHU. A Survey of Attribute-based Encryption Technology[J]. Netinfo Security, 2019, 19(9): 76-80.
[1] | SAHAI A, WATERS B.Fuzzy Identity-based Encryption[C]//Springer. Annual International Conference on Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Heidelberg: Springer, 2005: 457-473. |
[2] | GOYAL V, PANDEY O, SAHAI A, et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//ACM. ACM Conference on Computer and Communications Security, October 30-November 3, 2006, Alexandria, Virginia, USA. New York: ACM, 2006: 89-98. |
[3] | BETHENCOURT J, SAHAI A, WATERS B.Ciphertext-policy Attribute-based Encryption[C]//IEEE. IEEE Symposium on Security and Privacy, May 20-23, 2007, Berkeley, USA. New York: IEEE, 2007: 321-334. |
[4] | HOHENBERGER S, WATERS B.Online/Offline Attribute-based Encryption[C]//Springer. International Conference on Practice and Theory in Public-key Cryptography, March 26-28, 2014, Buenos Aires, Argentina. Heidelberg: Springer, 2014: 293-310. |
[5] | ATTRAPADUNG N, HERRANZ J, LAGUILLAUMIE F, et al. Attribute-based Encryption Schemes with Constant-size Ciphertexts[EB/OL]. , 2019-4-11. |
[6] | EMURA K, MIYAJI A, OMOTE K, et al.A Ciphertext-policy Attribute-based Encryption Scheme with Constant Ciphertext Length[J]. International Journal of Applied Cryptography, 2010, 2(1): 13-23. |
[7] | RAO Y S, DUTTA R.Decentralized Ciphertext-policy Attribute-based Encryption Scheme with Fast Decryption[C]//Springer. IFIP International Conference on Communications and Multimedia Security, September 25-26, 2013, Magdeburg, Germany. Heidelberg: Springer, 2013: 66-81. |
[8] | ATTRAPADUNG N, LIBERT B T, PANAFIEU D E.Expressive Key-policy Attribute-based Encryption with Constant-size Ciphertexts[C]//Springer. International Conference on Practice and Theory in Public Key Cryptography, March 6-9, 2011, Taormina, Italy. Heidelberg: Springer, 2011: 90-108. |
[9] | HOHENBERGER S, WATERS B.Attribute-based Encryption with Fast Decryption[C]//Springer. International Conference on Practice and Theory in Public-key Cryptography, February 26-March 1, 2013, Nara, Japan. Heidelberg: Springer, 2013: 162-179. |
[10] | LAI Junzuo, DENG R H, LI Yingjiu, et al.Fully Secure Key-policy Attribute-based Encryption with Constant-size Ciphertexts and Fast Decryption[C]//ACM. ACM Symposium on Information, Computer and Communications Security, June 4-6, 2014, Kyoto, Japan. New York: ACM, 2014: 239-248. |
[11] | GREEN M, HOHENBERGER S, WATERS B.Outsourcing the Decryption of ABE Ciphertexts[C]//USENIX Association. USENIX Conference on Security, August 8-12, 2011, San Francisco, USA. Berkeley: USENIX Association, 2011: 34-49. |
[12] | LI Keying, MA Hua.Outsourcing Decryption of Multi-authority ABE Ciphertexts[J]. International Journal Network Security, 2014, 16(4): 252-260. |
[13] | LI Jin, CHEN Xiaofeng, LI Jingwei, et al.Fine-grained Access Control System Based on Outsourced Attribute-based Encryption[C]//Springer. European Symposium on Research in Computer Security, September 9-13, 2013, Egham, UK. Heidelberg: Springer, 2013: 592-609. |
[14] | NISHIDE T, YONEYAMA K, OHTA K.Attribute-based Encryption with Partially Hidden Encryptor-specified Access Structures[C]//Springer. International Conference on Applied Cryptography and Network Security, June 3-6, 2008, New York, USA. Heidelberg: Springer, 2008: 111-129. |
[15] | BALU A, KUPPUSAMY K.Privacy Preserving Ciphertext Policy Attribute Based Encryption[C]//Springer. International Conference on Recent Trends in Network Security and Applications, July 23-25, 2010, Chennai, India. Heidelberg: Springer, 2010: 402-409. |
[16] | HUR J.Attribute-based Secure Data Sharing with Hidden Policies in Smart Grid[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(11): 2171-2180. |
[17] | LAI Junzuo, DENG R, LI Yingjiu.Expressive CP-ABE with Partially Hidden Access Structures[C]//ACM. ACM Symposium on Information, Computer and Communications Security, May 2-4, 2012, Seoul, Korea. New York: ACM, 2012: 18-28. |
[18] | WANG Le, YANG Zherong, LIU Rongjing, et al.A CP-ABE Privacy Preserving Method for Wearable Devices[J]. Netinfo Security, 2018, 18(6): 77-84. |
王乐,杨哲荣,刘容京,等.基于属性加密算法的可穿戴设备系统隐私保护方法研究[J].信息网络安全,2018,18(6):77-84. | |
[19] | XU Zhiqian, MARTIN K M.Dynamic User Revocation and Key Refreshing for Attribute-based Encryption in Cloud Storage[C]//IEEE. International Conference on Trust, Security and Privacy in Computing and Communications, June 25-27, 2012, Liverpool, UK. New Jersey: IEEE, 2012: 844-849. |
[20] | SHI Yanfeng, ZHENG Qingji, LIU Jiqiang, et al.Directly Revocable Key-policy Attribute-based Encryption with Verifiable Ciphertext Delegation[J]. Information Sciences, 2015, 295(C): 221-231. |
[21] | HUR J, NOH D K.Attribute-based Access Control with Efficient Revocation in Data Outsourcing Systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(7): 1214-1221. |
[22] | NARUSE T, MOHRI M, SHIRAISHI Y.Provably Secure Attribute-based Encryption with Attribute Revocation and Grant Function Using Proxy Re-encryption and Attribute Key for Updating[J]. Human-Centric Computing and Information Sciences, 2015, 5(1): 1-13. |
[23] | LV Zhiquan, ZHANG Min, FENG Dengguo.Cryptographic Access Control Scheme for Cloud Storage[J]. Journal of Frontiers of Computer Science and Technology, 2011, 5(9): 835-844. |
吕志泉,张敏,冯登国.云存储密文访问控制方案[J].计算机科学与探索,2011,5(9):835-844. | |
[24] | CHEUNG L, CALVIN N.Provably Secure Ciphertext Policy ABE[C]//ACM. ACM Conference on Computer and Communications Security, October 28-31, 2007, Alexandria. New York: ACM, 2007: 456-465. |
[25] | GOYAL V, JAIN A, PANDEY O, et al.Bounded Ciphertext Policy Attribute Based Encryption[C]//Springer. International Colloquium on Automata, Languages and Programming, July 7-11, 2008, Reykjavik, Iceland. Heidelberg: Springer, 2008: 579-591. |
[26] | WATERS B.Ciphertext-policy Attribute-based Encryption: An Expressive, Efficient, and Provably Secure Realization[C]//Springer. International Conference on Practice and Theory in Public Key Cryptography, March 6-9, 2011, Taormina, Italy. Heidelberg: Springer, 2011: 53-70. |
[27] | TAKASHIMA K.Expressive Attribute-based Encryption with Constant-size Ciphertexts from the Decisional Linear Assumption[C]//Springer. International Conference on Security and Cryptography for Networks, September 3-5, 2014, Amalfi, Italy. Heidelberg: Springer, 2014: 298-317. |
[28] | LEWKO A, OKAMOTO T, SAHAI A, et al.Fully Secure Functional Encryption: Attribute-based Encryption and(Hierarchical) Inner Product Encryption[C]//Springer. Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 30-June 3, 2010, French Riviera. Heidelberg: Springer, 2010: 62-91. |
[29] | ROUSELAKIS Y, BRENT W.Practical Constructions and New Proof Methods for Large Universe Attribute-based Encryption[C]//ACM. ACM SIGSAC Conference on Computer and Communications Security, November 4-8, 2013, Berlin, Germany. New York: ACM, 2013: 463-474. |
[30] | FREEMAN D M.Converting Pairing-based Cryptosystems From Composite-order Groups to Prime-order Groups[C]//Springer. Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 30-June 3, 2010, French Riviera. Heidelberg: Springer, 2010: 44-61. |
[31] | LEWKO A, WATERS B.New Proof Methods for Attribute-based Encryption: Achieving Full Security through Selective Techniques[C]//Springer. Annual Cryptology Conference on Advances in Cryptology, August 19-23, 2012, Santa Barbara, USA. Heidelberg: Springer, 2012: 180-198. |
[32] | ATTRAPADUNG N.Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More[C]//Springer. Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 11-15, 2014, Copenhagen, Denmark. Heidelberg: Springer, 2014: 557-577. |
[33] | BONEH D, CANETTI R, HALEVI S, et al.Chosen-ciphertext Security From Identity-based Encryption[J]. SIAM Journal on Computing, 2007, 36(5): 1301-1328. |
[1] | 许盛伟, 王飞杰. 多机构授权下可追踪可隐藏的属性基加密方案[J]. 信息网络安全, 2020, 20(1): 33-39. |
[2] | 汪金苗, 王国威, 王梅, 朱瑞瑾. 面向雾计算的隐私保护与访问控制方法[J]. 信息网络安全, 2019, 19(9): 41-45. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||