信息网络安全 ›› 2019, Vol. 19 ›› Issue (5): 47-53.doi: 10.3969/j.issn.1671-1122.2019.05.006

• 技术研究 • 上一篇    下一篇

支持叛逆者追踪的密文策略属性基加密方案

闫玺玺1(), 张棋超1, 汤永利1, 黄勤龙2   

  1. 1. 河南理工大学计算机科学与技术学院,河南焦作 454003
    2. 北京邮电大学网络空间安全学院,北京 100876
  • 收稿日期:2018-05-03 出版日期:2019-05-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:闫玺玺(1985—),女,河南,副教授,博士,主要研究方向为网络与信息安全、数字内容安全;张棋超(1992—),男,河南,硕士研究生,主要研究方向为密码学、网络与信息安全;汤永利(1972—),男,河南,教授,博士,主要研究方向为密码学算法检测、网络与信息安全;黄勤龙(1988—),男,江西,讲师,博士,主要研究方向为数字版权管理、数字内容安全、网络安全。

  • 基金资助:
    “十三五”国家密码发展基金[MMJJ20170122];河南省科技厅项目[142300410147];河南省教育厅项目[12A520021, 16A520013];河南理工大学博士基金[B2014-044];河南理工大学青年骨干教师资助项目

Ciphertext Policy Attribute-based Encryption Scheme Supporting Traitor Tracing

Xixi YAN1(), Qichao ZHANG1, Yongli TANG1, Qinlong HUANG2   

  1. 1. School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo Henan 454003, China
    2. School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2018-05-03 Online:2019-05-10 Published:2020-05-11

摘要:

属性基加密通过访问结构与属性集之间的匹配关系实现对用户解密权限的控制,高效地解决了“一对多”的秘密数据共享问题,在云计算、大数据、隐私保护等领域有着广泛的应用前景。然而,实际应用中存在叛逆者(或恶意用户)泄露私钥获取非法利益的情况。针对此问题,文章提出一种支持叛逆者追踪的密文策略属性基加密方案。该方案基于IBRAIMI等人提出的ABE方案,在私钥生成算法中融入Boneh-Boyen签名算法,实现对叛逆者的追踪。该方案被证明在DBDH假设下满足选择明文攻击安全。通过性能分析发现,该方案密文长度、私钥长度都得到了缩短,降低了计算开销和通信开销。因此,该方案在文件共享、电子病历等方面具有较大的理论意义和应用价值。

关键词: 属性基加密, 叛逆者追踪, 密文策略, DBDH假设

Abstract:

Attribute-based encryption(ABE) which can realize fine-grained access control by matching the access structure with attribute set meets the demand of secret data sharing in “one-to-many” environment. So it is widely used in the field of cloud computing, big data, privacy protection and so on. However, there are cases in which a traitor(or a malicious user) leaks a private key to obtain an illegal benefit in practical use. To solve this problem, a ciphertext policy attribute-based encryption scheme supporting traitor tracing is proposed in the paper. Based on the ABE scheme proposed by IBRAIMI, the Boneh-Boyen signature algorithm is introduced in the private key generation algorithm to track the traitor. The scheme is proved to be secure against chosen plaintext attack under DBDH assumption. The performance analysis shows that the size of the ciphertext and the private key are reduced, and the cost of computation and communication are optimized. Therefore, the scheme has higher theoretical significance and application values in file sharing, electronic medical records, and so on.

Key words: attribute-based encryption, traitor tracing, ciphertext strategy, DBDH assumption

中图分类号: