支持电路结构的属性基加密研究综述Review on attribute-based encryption for circuits
吴青;李良俊;马旭金;
摘要(Abstract):
支持电路结构的属性基加密(attribute-based encryption,ABE)方案是在实现机密性和数据完整性的基础上,克服传统密码的访问控制单一等缺点,抵御"回溯攻击"提高信息安全性的一种新方法。指出电路结构的ABE机制并进行深入研究与讨论,分别分析和总结支持电路结构的基于密钥策略的加密属性(key-policy attribute-based encryption,KP-ABE)和基于密文策略加密属性(ciphertext-policy attribute-based encryption,CP-ABE)的设计和构造,提出现存的一些难题,并展望电路结构ABE的未来研究前景。
关键词(KeyWords): 属性基加密;访问控制;通用电路
基金项目(Foundation): 国家自然科学基金项目(51875457);; 陕西省重点研发计划项目(2018GY-018)
作者(Author): 吴青;李良俊;马旭金;
Email:
DOI: 10.13682/j.issn.2095-6533.2020.04.001
参考文献(References):
- [1] CHEN G,XU Z Q,J H,et al.Generic user revocation systems for attribute-based encryption in cloud storage[J].Frontiers of Information Technology & Electronic Engineering,2019,20(6):773-786.DOI:10.1631/FITEE.1800512.
- [2] WU Q,ZHANG L Y,ZHANG J X.Fuzzy biometric-based encryption for encrypted data in the cloud[J].IEICE Trans.Fundamentals,2017,E100-A(5):1257-1261.DOI:10.1587/transfun.E100.A.1257.
- [3] AMERI M H,DELAVAR M,MOHAJERI J,et al.A key-policy attribute-based temporary keyword search scheme for secure cloud storage[J].IEEE Transactions on Cloud Computing,2018(99):1-12.DOI:10.1109/TCC.2018.2825983.
- [4] ZHANG R,MA H,LU Y.Fine-grained access control system based on fully outsourced attribute-based encryption[J].Journal of Systems and Software,2017,125:344-353.DOI:10.1016/ j.issn.2016.12.018.
- [5] SAHAI A,WATERS B.Fuzzy identity-based encryption[C]//Advances in the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2005).Heidelberg:Springer,2005:457-473.DOI:10.1007/114266 39_ 27.
- [6] 郑东,赵庆兰,张应辉.密码学综述[J].西安邮电大学学报,2013,18(6):1-10.DOI:10.3969/j.issn.1007-3264.2013.06.001.
- [7] GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the ACM Conference on Computer and Communications Security.Alexandria:ACM,2006:89-98.DOI:10.1145/1180405.1180418.
- [8] BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//Proceedings of the Security and Privacy,2007.SP '07.IEEE Symposium on.Berkeley:IEEE,2007:321-334.DOI:10.1109/ SP.2007.11.
- [9] PERUMAL B,RAJASEKARAN M P,DURAIYARASAN S.An efficient hierarchical attribute set based encryption scheme with revocation for outsourcing personal health records in cloud computing[C]// Proceedings of the 2013 International Conference on Advanced Computing & Communication Systems (ICACCS).Coimbatore :IEEE,2013:1-5.DOI:10.11 09/ICACCS.2013.6938700.
- [10] 姜頔,韩益亮,杨晓元,等.基于多线性映射的可撤销属性基加密方案[J].武汉大学学报(理学版),2016,62(2):148-154.DOI:10.14188/j.issn.1671-8836.2016.02.008.
- [11] GO O,REIHANEH S N,ZHANG L F.Outsourcing scheme of ABE encryption secure against malicious adversary[J].Computers&Security,2019,86:437-452.DOI:10.1016/j.cose.2018.10.012.
- [12] LI J,HUANG X,LI J,et al.Securelyoutsourcing attribute-based encryption with checkability[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(8):2201-2210.DOI:10.1109/tpds.2013.271.
- [13] 吴青,张乐友.标准模型下基于身份的强不可伪造签名方案[J].北京邮电大学学报,2011(3):75-78.
- [14] ZHANG J,GAO S.Efficient provable certificateless blind signature scheme[C]//Proceedings of the IEEE International Conference on Networking,Sensing and Control,ICNSC 2010,Chicago:IEEE,2010:292-297.
- [15] BYUN J W,LEE D H,LIM J,et al.Efficient conjunctive keyword search on encrypted data storage system[C]//Proceedings of the European Conference on Public Key Infrastructure:Theory & Practice.Korea:Verlag,2006:184-196.DOI:10.1007/117747 16_15.
- [16] HU C,LIU P.Asecure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension[C]//Proceedings of the Advances in Computer Science,Environment,Ecoinformatics,and Education International Conference,CSEE 2011,Wuhan:Springer,2011,215:131-136.DOI:10.1007/978-3-642-23324-1_23.
- [17] SAHAI A,WATERS B.Attribute-based encryption for circuits from multilinear maps[J].Computer Science,2013,45(6):479-499.DOI:10.1007/978-3-642-40084-1_27.
- [18] ZHAO J,GAO H,ZHANG J.Attribute-based encryption for circuits on lattices[J].清华大学学报(英文版),2014,19(5):463-469.DOI:10.3969/j.issn.1007-0214.2014.05.005.
- [19] 韩益亮,卢万谊,杨晓元.支持电路结构的多线性映射属性签密方案[J].四川大学学报(工程科学版),2013,45(6):27-32.
- [20] IPLEA,FERUCIO L I,DRA G,CONSTANTIN C.Key-policy attribute-based encryption for boolean circuits from bilinear maps[C]//Proceedings of the Revised Selected Papers of the First International Conference on Cryptography and Information Security.New York:Verlag Inc.2014,9024:175-193.DOI:10.1007/978-3-319-21356-9_12.
- [21] DATTA P,DUTTA R,MUKHOPADHYAY S.Compactattribute-based encryption and signcryption for general circuits from multilinear maps[C]//Proceedings of the International Conference on Cryptology in India.Bangalore:Cham,LNCS 9462,2015:3-24.DOI:10.1007/978-3-319-26617-6_1.
- [22] 胡鹏,高海英.一种实现一般电路的密钥策略的属性加密方案[J].软件学报,2016(6):1498-1510.DOI:10.13328/j.cnki.jos.004993.
- [23] ATTRAPADUNG N .Dualsystem framework in multilinear settings and applications to fully secure (compact) ABE for unbounded-size circuits[C]// Proceedings of the IACR International Workshop on Public Key Cryptography.Tokyo:LNCS,2017:3-35.DOI:10.1007/978 -3-662-543 88-7_1.
- [24] XU J,WEN Q Y,LI W M,et al.Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing[J].Softuting-A Fusion of Foundations,Methodologies & Applications,2017,21(18):5265-5279.DOI:10.1007/s00500-016-2244-5.
- [25] HU P,GAO H.Ciphertext-policy attribute-based encryption for general circuits from bilinear maps[J].Wuhan University Journal of Natural Sciences,2017,22(2):171-177.DOI:10.1007/s11859-017-1231-8.
- [26] YUSUKE S,NUTTAPONG A,GOICHIRO H.Practical attribute-based signature schemes for circuits from bilinear map[J].IET Information Security,2018,12(3):184-193.DOI:/10.1049/iet-ifs.2017.0029.
- [27] 张丽娜,杨波,周彦伟,等.适于任意深度电路结构的紧致属性基广播加密方案[J].计算机学报,2018,41(2):452-463.
- [28] GOYAL V,JAIN A,PANDEY O,et al.Boundedciphertext policy attribute based encryption[C]//Proceedings of the 35th international colloquium on Automata,Languages and Programming,Part II.Sydney:ACM,LNCS 5126,2008:279-591.DOI:10.1007/978-3-540-70583-3_47.
- [29] CUI H,DENG R H,LAI J,et al.An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures,revisited[J].Computer Networks,2018,133:157-165.DOI:10.1016/j.comnet.2018.01.034.
- [30] PHUONG T,YANG G,SUSIOL W.Hiddenciphertext policy attribute based encryption under standard assumptions[J].IEEE Transactions on Information Forensics & Security,2016,11(1):35-45.DOI:10.1109/TIFS.2015.24757 23.
- [31] LEE K,PARK S.Revocable hierarchical identity-based encryption with shorter private keys and update keys[J].Designs Codes and Cryptography,2018,86(4):1-34.DOI:10.1007/s10623-017-0453-2.
- [32] YANG K,HAN Q,LI H,et al.Anefficient and fine-grained big data access control scheme with privacy-preserving policy[J].IEEE Internet of Things Journal,2017,4(2):563-571.DOI:10.1109/JIOT.2016.2571718.
- [33] ZHAO J,GAO H.LSSSmatrix-based attribute-based encryption on lattices[C]//Proceedings of the 2017 13th International Conference on Computational Intelligence and Security (CIS).Hong Kong:IEEE,2017:253-257.DOI:10.1109/CIS.2017.00062.