电子学报 ›› 2020, Vol. 48 ›› Issue (8): 1545-1551.DOI: 10.3969/j.issn.0372-2112.2020.08.012

• 学术论文 • 上一篇    下一篇

支持可验证加解密外包的CP-ABE方案

杨贺昆1, 冯朝胜1,3, 晋云霞1, 王蔺1, 罗王平1, 邓红辉2   

  1. 1. 四川师范大学计算机科学学院, 四川成都 610101;
    2. 广安职业技术学院, 四川广安 638500;
    3. 网络与数据安全四川省重点实验室, 电子科技大学, 四川成都 610054
  • 收稿日期:2019-05-30 修回日期:2020-04-23 出版日期:2020-08-25 发布日期:2020-08-25
  • 通讯作者: 冯朝胜
  • 作者简介:杨贺昆 男,1993年出生,河南驻马店人,四川师范大学研究生,主要研究方向为信息安全. E-mail:Yangpotatoes@gmail.com
  • 基金资助:
    国家自然科学基金(No.61373163);国家科技支撑计划课题(No.2014BAH11F02);四川省科技支撑计划(No.2015GZ079);网络与数据安全四川省重点实验室课题(No.NDS2019-1);国防科技重点实验室项目(No.6142103010709)

ACP-ABE Scheme with Verifiable Outsourced Encryption and Decryption

YANG He-kun1, FENG Chao-sheng1,3, JIN Yun-xia1, WANG Lin1, LUO Wang-ping1, DENG Hong-hui2   

  1. 1. College of Computer Science, Sichuan Normal University, Chengdu, Sichuan 610101, China;
    2. School of Electronics and Information Engineering, Guang'an Vocational and Technical College, Guangan, Sichuan 638500, China;
    3. Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, Sichuan 610054, China
  • Received:2019-05-30 Revised:2020-04-23 Online:2020-08-25 Published:2020-08-25

摘要: 针对现有的应用于基于属性加密方案的安全模指数外包算法存在会降低安全性、验证概率低、外包计算结果可能出错等问题,利用改进的安全模指数外包算法,提出一种支持可验证加解密外包的CP-ABE(Ciphertext-Policy Attribute-Based Encryption)方案.将属性相关密钥子项外包,将共享密文子项的一半计算任务外包,并对所有的外包结果进行验证.理论分析和实验结果都表明,和现有相关方案相比,无论在密钥生成时,还是在加密时,所提出方案的授权机构和用户客户端的计算量都有明显减少.安全性分析表明,所提出的方案达到CPA(Chosen Plaintext Attack)安全.

关键词: 密文共享, 加密外包, 解密外包, 基于属性加密

Abstract: The existing outsourcing algorithms for modular exponentiations has some problems such as low security,low probability of validation and wrong calculation results.a CP-ABE(Ciphertext-Policy Attribute-Based Encryption) scheme with verifiable outsourced encryption and decryption is proposed with the help of the improved algorithm for secure outsourcing of modular exponentiations.The scheme outsources attribute-related key subitems,outsources half of the computing tasks of shared ciphertext subitems,and verifies all the outsourced results.Theoretical and experimental analysis show that compared with the existing related schemes,both in key generation and encryption,the computing overhead of both authority centers and user clients of the proposed scheme has been significantly reduced.Security analysis shows that the proposed scheme can defend against chosen plaintext attacks.

Key words: ciphertext sharing, outsourced encryption, outsourced decryption, attribute-based encryption

中图分类号: