计算机应用 ›› 2017, Vol. 37 ›› Issue (11): 3299-3303.DOI: 10.11772/j.issn.1001-9081.2017.11.3299

• 网络空间安全 • 上一篇    下一篇

固定密文长度的可验证属性基外包解密方案

李聪1,2, 杨晓元1,2, 王绪安1,2, 白平1,2   

  1. 1. 武警工程大学 电子技术系, 西安 710086;
    2. 武警工程大学 网络与信息安全武警部队重点实验室, 西安 710086
  • 收稿日期:2017-05-15 修回日期:2017-07-03 出版日期:2017-11-10 发布日期:2017-11-11
  • 通讯作者: 李聪
  • 作者简介:李聪(1990-),男,山东济宁人,硕士研究生,主要研究方向:公钥密码学;杨晓元(1959-),男,湖南湘潭人,教授,博士生导师,CCF会员,主要研究方向:密码学、信息安全;王绪安(1981-),男,湖北公安人,副教授,博士,主要研究方向:密码学、信息安全;白平(1990-),男,内蒙古乌兰察布人,硕士研究生,主要研究方向:公钥密码学。
  • 基金资助:
    国家自然科学基金资助项目(U1636114,61572521);陕西省自然科学基础研究计划项目(2016JQ6037)。

Efficient verifiable outsourced decryption based on attribute-based encryption and fixed ciphertext length

LI Cong1,2, YANG Xiaoyuan1,2, WANG Xu'an1,2, BAI Ping1,2   

  1. 1. Department of Electronic Technology, Engineering College of Chinese Armed Police Force, Xi'an Shaanxi 710086, China;
    2. Key Laboratory of Network and Information Security, Engineering College of Chinese Armed Police Force, Xi'an Shaanxi 710086, China
  • Received:2017-05-15 Revised:2017-07-03 Online:2017-11-10 Published:2017-11-11
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (U1636114, 61572521), the Natural Science Basic Research Plan in Shaanxi Province of China (2016JQ6037)

摘要: 传统密钥策略属性基加解密方案存在密文长度随着属性增加而线性增加,在通信过程中消耗用户大量的通信带宽的缺点。提出了属性加密的改进方案,基于密钥策略属性加密,提出具有固定密文长度的可验证外包解密方案,在非单调访问结构实现密文长度固定,有效节省通信带宽,通过对外包密钥生成算法的改进,实现一次模指数运算,有效缩短外包密钥生成时间。通过运用哈希函数,实现外包解密的验证性,并对其安全性进行了证明。

关键词: 密钥策略属性基加密, 外包解密, 可验证性, 云计算

Abstract: The traditional key policy attribute base encryption and decryption scheme has the disadvantages that the ciphertext length increases linearly with the increase of the number of attributes, and consumes a large amount of communication bandwidth of the user in the communication process. The improved scheme of attribute encryption was proposed. Based on the encryption of key policy attributes, a verifiable packet decryption scheme with fixed ciphertext length was proposed. In the non-monotonic access structure, the cipher length was fixed, and the communication bandwidth was effectively saved. Through the improvement of outsourced key generation algorithm, a primary modular exponentiation operation was realized, and the generation time of key generation was effectively shortened.The hash function was used to realize the verification of the decryption and its security was proved.

Key words: Key-Policy Attributed-Based Encryption (KP-ABE), outsourced description, verifiability, cloud computing

中图分类号: