《计算机应用》唯一官方网站 ›› 2022, Vol. 42 ›› Issue (7): 2094-2103.DOI: 10.11772/j.issn.1001-9081.2021040602

• 网络空间安全 • 上一篇    

基于椭圆曲线加密且支持撤销的属性基加密方案

孙京宇1, 朱家玉2, 田自强1, 史国振3, 关川江4()   

  1. 1.西安电子科技大学 计算机科学与技术学院, 西安 710071
    2.北京电子科技学院 网络空间安全系, 北京 100070
    3.北京电子科技学院 电子与通信工程系, 北京 100070
    4.西安电子科技大学 通信工程学院, 西安 710071
  • 收稿日期:2021-04-19 修回日期:2021-07-02 接受日期:2021-07-05 发布日期:2022-07-15 出版日期:2022-07-10
  • 通讯作者: 关川江
  • 作者简介:孙京宇(1998—),男,陕西西安人,硕士研究生,主要研究方向:云数据安全
    朱家玉(1996—),女,黑龙江大兴安岭人,硕士研究生,主要研究方向:云数据安全
    田自强(1997—),男,湖北潜江人,硕士研究生,主要研究方向:云数据安全
    史国振(1974—),男,河南济源人,教授,博士,主要研究方向:网络安全、嵌入式系统;
  • 基金资助:
    国家重点研发计划项目(2017YFB0801803)

Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation

Jingyu SUN1, Jiayu ZHU2, Ziqiang TIAN1, Guozhen SHI3, Chuanjiang GUAN4()   

  1. 1.School of Computer Science and Technology,Xidian University,Xi’an Shaanxi 710071,China
    2.Department of Cyberspace Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China
    3.Department of Electronic and Communication Engineering,Beijing Electronic Science and Technology Institute,Beijing 100070,China
    4.School of Communications Engineering,Xidian University,Xi’an Shaanxi 710071,China
  • Received:2021-04-19 Revised:2021-07-02 Accepted:2021-07-05 Online:2022-07-15 Published:2022-07-10
  • Contact: Chuanjiang GUAN
  • About author:SUN Jingyu, born in 1998, M. S. candidate. His research interests include cloud data security.
    ZHU Jiayu, born in 1996, M. S. candidate. Her research interests include cloud data security.
    TIAN Ziqiang, born in 1997, M. S. candidate. His research interests include cloud data security.
    SHI Guozhen, born in 1974, Ph. D., professor. His research interests include network security, embedded system.
  • Supported by:
    National Key Research and Development Program of China(2017YFB0801803)

摘要:

在云终端用户资源受限的场景中,传统属性基加密方案中存在着计算开销大以及不能实现实时撤销的不足。为了实现云端数据安全高效的共享,提出了一种基于椭圆曲线加密(ECC)算法且支持细粒度撤销的属性基加密方案。该方案使用计算较轻量级的椭圆曲线上的标量乘法代替传统属性基加密方案中计算开销较大的双线性配对,以降低系统中用户在解密时的计算开销,提高系统的效率,使方案更适用于资源受限的云终端用户场景。利用表达能力更强和计算更高效的有序二元决策图(OBDD)结构来描述用户定义的访问策略,以减少嵌入密文中的冗余属性来缩短密文长度。为每个属性建立一个由拥有该属性用户组成的属性组,并为组内每个成员生成唯一的用户属性组密钥。当发生属性撤销时,利用最小子集覆盖技术为组内剩余成员生成新的属性组,实现实时的细粒度属性撤销。安全分析表明,所提方案具有选择明文攻击不可区分性、前向安全性和后向安全性;性能分析表明,所提方案在访问结构表达和计算能力上优于(tn)门限秘密共享方案和线性秘密共享方案(LSSS),其解密计算效率满足资源受限的云终端用户的需求。

关键词: 属性基加密, 有序二元决策图, 属性撤销, 云计算, 细粒度, 椭圆曲线加密算法

Abstract:

In view of the scenarios where the resources of cloud terminal users are limited, the traditional attribute based encryption schemes have the disadvantages of high computing cost and being unable to achieve real-time revocation. In order to realize the safe and efficient sharing of cloud data, an attribute based encryption scheme based on Elliptic Curve Cryptography (ECC) algorithm and supporting fine-grained revocation was proposed. In the scheme, the relatively lightweight scalar multiplication on the elliptic curve was used to replace the bilinear pairing with higher computational cost in the traditional attribute based encryption schemes, thereby reducing the computational cost of users during decryption in the system, improving the efficiency of the system and making the scheme more suitable for resource constrained cloud terminal user scenarios. In order to reduce the redundant attributes embedded in the ciphertext to shorten the length of the ciphertext, the more expressive and computationally efficient Ordered Binary Decision Diagram (OBDD) structure was used to describe the user-defined access policy. An attribute group composed of users with the attribute was established for each attribute, and a unique user attribute group key was generated for each member of the group. When the attribute revocation occurred, the minimum subset cover technology was used to generate a new attribute group for the remaining members in the group to realize real-time fine-grained attribute revocation. Security analysis shows that the proposed scheme has the indistinguishability of selective plaintext attacks, forward security and backward security. Performance analysis shows that the proposed scheme outperforms (tn) threshold secret sharing scheme and Linear Secret Sharing Scheme (LSSS) in terms of access structure expression and computing capability, and has the decryption computational efficiency meeting the need of resource constrained cloud terminal users.

Key words: attribute based encryption, Ordered Binary Decision Diagram (OBDD), attribute revocation, cloud computing, fine-grained, Elliptic Curve Cryptography (ECC) algorithm

中图分类号: