作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2019, Vol. 45 ›› Issue (1): 115-120,128. doi: 10.19678/j.issn.1000-3428.0049576

• 安全技术 • 上一篇    下一篇

基于安全三方计算的密文策略加密方案

谭跃生,鲁黎明,王静宇   

  1. 内蒙古科技大学 信息工程学院,内蒙古 包头 014010
  • 收稿日期:2017-12-05 出版日期:2019-01-15 发布日期:2019-01-15
  • 作者简介:谭跃生(1959—),男,教授,主研方向为信息安全、高性能计算、云计算、大规模数据处理与挖掘;鲁黎明,硕士研究生;王静宇,副教授、博士
  • 基金资助:

    国家自然科学基金(61462069,61662056);内蒙古自治区自然科学基金(2016MS0608,2016MS0609)

Ciphertext Policy Encryption Scheme Based on Secure Three-party Computation

TAN Yuesheng,LU Liming,WANG Jingyu   

  1. School of Information Engineering,Inner Mongolia University of Science and Technology,Baotou,Inner Mongolia 014010,China
  • Received:2017-12-05 Online:2019-01-15 Published:2019-01-15

摘要:

针对现有密文策略属性加密方案存在用户密钥易泄露的问题,提出一种基于安全三方计算协议的密文策略方案。通过属性授权中心、云数据存储中心及用户之间进行安全三方计算构建无代理密钥发布协议,使用户端拥有生成完整密钥所必需的子密钥。安全分析表明,该方案能够有效消除单密钥生成中心及用户密钥在传输给用户过程中易泄露所带来的威胁,增强用户密钥的安全性。

关键词: 属性加密, 信息安全, 安全三方计算, 访问控制, 密文策略

Abstract:

Aiming at the problem that the user key is easy to be leaked in the existing ciphertext policy attribute encryption scheme,a ciphertext policy scheme based on secure three-party computation protocol is proposed.By using Attribute Authorization center(AA),cloud Data Storage Center(DSC)and User,a secure three-party calculation is carried out to construct the proxy-free key publishing protocol,which enables the client to have the necessary subkeys to generate the complete key.The security analysis shows that this scheme can effectively eliminate the threat caused by the single secret key generation center and the easy leakage of the user key in the process of transmission to the user and enhance the security of the user key.

Key words: attribute encryption, information security, secure three-party computation, access control, ciphertext policy

中图分类号: