自然科学版
陕西师范大学学报(自然科学版)
数学与计算机科学
云存储环境下支持用户动态撤销的属性加密方案
PDF下载 ()
齐艳姣1, 李艳平1*, 鲁来凤1, 黄梅娟2
(1 陕西师范大学 数学与信息科学学院, 陕西 西安 710119;2 宝鸡文理学院 数学与信息科学学院, 陕西 宝鸡 721013)
李艳平,女,副教授,研究方向为密码学理论及其应用。E-mail: lyp@snnu.edu.cn
摘要:
基于CP-ABE算法,提出一个云存储环境下支持已注册合法用户动态撤销的属性基加密方案。与传统的委托云中心代理重加密思想不同,本方案中密文是由云存储中心产生的部分密钥k和数据拥有者放在访问结构中的s值共同作用产生,满足属性访问结构的用户可以重构s,恰好抵消部分密钥k在密文中的盲化因子而得到数据明文。当已注册合法用户撤销后,云存储中心更新原来用于加密的部分密钥为k′以及部分密文,即可阻止注册用户撤销后无法解密数据,从而保护数据的后向安全性。未注销用户也仅需更新部分解密私钥即可正常解密,方案整体所需计算量、更新存储量和通信量较低。
关键词:
云存储; 密文策略属性加密; 后向安全; 访问控制
收稿日期:
2017-10-23
中图分类号:
TP309.7
文献标识码:
A
文章编号:
1672-4291(2018)05-0001-08
基金项目:
国家自然科学基金(61402275,61572246); 中央高校基本科研业务费专项资金(GK201803005,GK201402004); 宝鸡市科技计划(15RKX-1-5-8)
Doi:
Attribute-based encryption scheme supported user revocation in cloud storage
QI Yanjiao1, LI Yanping1* , LU Laifeng1, HUANG Meijuan2
(1 School of Mathematics and Information Science, Shaanxi Normal University, Xi′an 710119, Shaanxi, China; 2 School of Mathematics and Information Science, Baoji University of Arts and Sciences, Baoji 721013, Shaanxi, China)
Abstract:
Based on the CP-ABE algorithm, an attribute-based encryption scheme supported dynamical registered user revocation in cloud storage is proposed in this paper. Ciphertext is encrypted by the partial key k from the cloud storage center and s from the data owners which be hidden on the access structure, the users whose attributes satisfy the access structure can reconstruct s and decrypt the plain data because the ciphertext can eliminate the blind factor with the partial key k. After the revocation of a registered legal user happened, the cloud storage center update the original symmetric key k to k′ as well as the partial ciphertext of data, which can prevent those revoked users decrypting the data and provide the backward security the shared data. The unrevoked users only need to update the partial private key and they can normally decrypt the updated ciphertext. The whole scheme required lower computation, updating storage and communication cost.
KeyWords:
cloud storage; ciphertext-policy attribute-based encryption; backward security; access control