首页> 外文期刊>Future generation computer systems >Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing
【24h】

Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing

机译:基于强制可追溯密文策略的属性加密,可防止雾计算中的特权滥用

获取原文
获取原文并翻译 | 示例

摘要

Due to the structure of fog systems, ciphertext-policy attribute-based encryption (CP-ABE) is regarded as a promising technique to address certain security problems present in the fog. Unfortunately, in most traditional CP-ABE systems, a user can deliberately leak his attribute keys to others or use his private key to build a decryption device and provide a decryption service with little risk of being caught (untraceable). We refer to this behavior as privilege abuse. The privilege abuse problem will seriously hinder the adoption of CP-ABE. To address the problem, we propose a novel black-box traceable CP-ABE scheme that is much simpler than the existing white-box traceable schemes. A malicioususer who builds a decryption black-box can be tracked and exposed by our scheme. Due to its scalability and relatively high efficiency, the scheme could be practical for fog systems. Furthermore, we point out that, if the adversary can distinguish the tracing ciphertext from the normal ciphertext, he can frustrate tracking by outputting incorrect decryption results. Thus, the traceability must becompulsory, so as to ensure that the adversary cannot distinguish between the tracing ciphertext and the normal ciphertext. Therefore, we present a formal definition of compulsory traceability with a new security game, and our scheme is proved to be secure and compulsory traceable under the generic group model.
机译:由于雾系统的结构,基于密文策略属性的加密(CP-ABE)被认为是解决雾中某些安全问题的有前途的技术。不幸的是,在大多数传统的CP-ABE系统中,用户可以故意将其属性密钥泄露给其他人,或者使用其私钥来构建解密设备并提供解密服务,而被捕获的风险很小(无法追踪)。我们将此行为称为特权滥用。特权滥用问题将严重阻碍CP-ABE的采用。为了解决该问题,我们提出了一种新颖的黑盒可追踪CP-ABE方案,该方案比现有的白盒可追踪方案简单得多。我们的方案可以跟踪并揭露构建解密黑匣子的恶意用户。由于其可伸缩性和相对较高的效率,该方案对于雾气系统可能是实用的。此外,我们指出,如果对手可以将跟踪密文与正常密文区分开,则他可以通过输出不正确的解密结果来阻止跟踪。因此,必须具有可追溯性,以确保对手无法区分跟踪密文和常规密文。因此,我们使用新的安全博弈提出了强制性可追溯性的正式定义,并且在通用组模型下,我们的方案被证明是安全且强制性可追溯的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号