| 注册
首页|期刊导航|密码学报(中英文)|密钥可追踪的属性基跨域访问控制加密方案

密钥可追踪的属性基跨域访问控制加密方案

张应辉 杨嘉雨 郑晓坤 吴阿新

密码学报(中英文)2025,Vol.12Issue(5):1031-1046,16.
密码学报(中英文)2025,Vol.12Issue(5):1031-1046,16.DOI:10.13868/j.cnki.jcr.000811

密钥可追踪的属性基跨域访问控制加密方案

Key Traceable Attribute-Based Cross-Domain Access Control Encryption

张应辉 1杨嘉雨 1郑晓坤 2吴阿新3

作者信息

  • 1. 西安邮电大学网络空间安全学院,西安 710121||西安邮电大学无线网络安全技术国家工程研究中心,西安 710121
  • 2. 青海师范大学计算机学院,西宁 810016
  • 3. 密码科学技术全国重点实验室,北京 100878
  • 折叠

摘要

Abstract

In order to realize the access control of shared data between different enterprises and companies,as well as realizing privacy protection of user data,this study proposes a key traceable attribute-based cross-domain access control encryption scheme.Firstly,this study uses non-interactive zero-knowledge proof,structure-preserving signature,and randomizable ciphertext policy attribute-based encryption scheme to realize the characteristics of sender anonymity and ciphertext random-ization.Secondly,the existing cross-domain access control encryption schemes have not been found to exist supporting traitor tracing.The proposed scheme binds the user identity and the decryption key,and generates a secret sharing value as the identity through the Shamir threshold secret sharing scheme,which realizes the identity traceability of the malicious user key and avoids the use of the identity table to store the user's identity.This reduces the user's storage complexity from O(n)in traditional schemes to O(w),where the total number of users n in the system is much greater than the number of attributes w owned by a single user.Finally,the proposed scheme is proved to be secure based on no-read rules,no-write rules,indistinguishability chosen plaintext attack,and traceable secu-rity model.The comparative analysis on related schemes shows that the proposed scheme improves the decryption efficiency while increasing the key traceability functionality.Under the same experimental conditions,the total decryption time is reduced by an average of 320 ms compared with the compared scheme.

关键词

跨域访问控制加密/密文策略属性基加密/非交互式零知识证明/结构保持签名/叛逆者追踪

Key words

cross-domain access control encryption/ciphertext-policy attribute-based encryption/non-interactive zero-knowledge/structure-preserving signature/traitor tracing

分类

计算机与自动化

引用本文复制引用

张应辉,杨嘉雨,郑晓坤,吴阿新..密钥可追踪的属性基跨域访问控制加密方案[J].密码学报(中英文),2025,12(5):1031-1046,16.

基金项目

国家密码科学基金(2025NCSF02037) (2025NCSF02037)

国家自然科学基金(62072369,62072371) (62072369,62072371)

陕西高校青年创新团队(23JP160) (23JP160)

陕西省特支计划青年拔尖人才支持计划 ()

陕西省技术创新引导计划(2023-YD-CGZH-31) (2023-YD-CGZH-31)

陕西省技术创新引导专项(2024QY-SZX-17) (2024QY-SZX-17)

中国博士后科学基金(2024T170080)National Cryptologic Science Fund of China(2025NCSF02037) (2024T170080)

National Natural Science Foundation of China(62072369,62072371) (62072369,62072371)

Youth Innovation Team of Shaanxi Universities(23JP160) (23JP160)

Shaanxi Special Sup-port Program for Youth Top-Notch Talent ()

Technology Innovation Leading Program of Shaanxi(2023-YD-CGZH-31) (2023-YD-CGZH-31)

Technology Innovation Guidance Special Fund of Shaanxi Province(2024QY-SZX-17) (2024QY-SZX-17)

China Postdoctoral Science Foundation(2024T170080) (2024T170080)

密码学报(中英文)

OA北大核心

2095-7025

访问量0
|
下载量0
段落导航相关论文