首页> 外文期刊>International Journal of Foundations of Computer Science >Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud
【24h】

Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud

机译:符合公共验证的CP-ABE:如何有效保护云中的外包数据

获取原文
获取原文并翻译 | 示例
           

摘要

Ciphertext-policy attribute-based encryption, denoted by CP-ABE, extends identity based encryption by taking a set of attributes as users' public key which enables scalable access control over outsourced data in cloud storage services. However, a decryption key corresponding to an attribute set may be owned by multiple users. Then, malicious users are subjectively willing to share their decryption keys for profits. In addition, the authority who issues decryption keys in CP-ABE system is able to generate arbitrary decryption key for any (including unauthorized) user. Key abuses of both malicious users and the authority have been regarded as one of the major obstacles to deploy CP-ABE system in real-world commercial applications. In this paper, we try to solve these two kinds of key abuses in CP-ABE system, and propose two accountable CP-ABE schemes supporting any LSSS realizable access structures. Two proposed accountable CP-ABE schemes allow any third party (with the help of authorities if necessary) to publicly verify the identity of an exposed decryption key, allow an auditor to publicly audit whether a malicious user or authorities should be responsible for an exposed decryption key, and the key abuser can't deny it. At last, we prove the two schemes can achieve publicly verifiable traceability and accountability.
机译:基于CP-ABE的基于CP-ABE的基于密文 - 策略的加密通过将一组属性作为用户的公钥占用云存储服务中的外包数据来扩展基于Idity的加密。然而,对应于属性集合的解密密钥可以由多个用户拥有。然后,恶意用户主观愿意与利润分享他们的解密密钥。此外,在CP-ABE系统中发出解密密钥的权限能够为任何(包括未授权)用户生成任意解密密钥。恶意用户和权威的关键滥用被视为在现实世界商业应用中部署CP-ABE系统的主要障碍之一。在本文中,我们尝试在CP-ABE系统中解决这两种关键滥用,并提出了两个支持任何LSSS可实现的访问结构的CP-ABE计划。两项拟议的责任CP-ABE计划允许任何第三方(在当局的帮助下,如有必要)公开核实暴露的解密密钥的身份,允许审计员公开审核恶意用户或当局是否应对暴露的解密负责关键,关键的滥用者不能否认它。最后,我们证明这两种方案可以实现公开可核查的可追溯性和问责制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号