An attribute key distribution scheme based on low dependence trusted authorities

被引:0
|
作者
Zhang X. [1 ,2 ]
Wang W. [1 ]
Lin J. [2 ,3 ]
机构
[1] School of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing
[2] College of Communication Engineering, Chongqing University, Chongqing
[3] Chongqing Key Laboratory of Photoelectronic Information Sensing and Transmitting Technology, Chongqing University of Posts and Telecommunications, Chongqing
关键词
Attribute-based key; Cloud storage; Low dependence; Trusted authority;
D O I
10.23940/ijpe.18.11.p10.26432651
中图分类号
学科分类号
摘要
Aiming at the problem of “authority deception” and attribute restoration on the key distribution center, an attribute key distribution scheme under the environment of low reliance on trusted authorities is proposed in this paper. In this scheme, the users’ attributes are generated by the Cloud Storage Service Provider (CSSP), and then the attributes are divided into several attribute blocks and distributed to users. The user exchanges attribute blocks with other users and restore the attributes through the Chinese remainder theorem after receiving the attribute blocks. The multiple Key Management Centers (KMC) generate the attribute parameters according to the user attributes, and the last user calculates the attribute keys through the received attribute parameters. This scheme avoids the problem of “authority deception” and has high computational efficiency. Finally, the experimental results show that the program is safe and efficient. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:2643 / 2651
页数:8
相关论文
共 50 条
  • [1] Multiple Attribute Authorities Attribute-Based Designated Confirmer Signature Scheme with Unified Verification
    Ren, Yan
    Wang, Guilin
    Hu, Yunhong
    Wang, Qiuyan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (11): : 2341 - 2348
  • [2] Authenticated public key distribution scheme without trusted third party
    Koo, JH
    Kim, BH
    Lee, DH
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 926 - 935
  • [3] Attribute Signature Identity Authentication Scheme Based on Blockchain and Trusted Execution Environment
    Ran J.
    Cai D.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (11): : 2555 - 2566
  • [4] Topology-Abstraction-Based Protection Scheme in Quantum Key Distribution Networks with Partially Trusted Relays
    Zhang, Qin
    Liu, Yikai
    Yu, Xiaosong
    Zhao, Yongli
    Zhang, Jie
    PHOTONICS, 2022, 9 (04)
  • [5] Safe renewal of a random key pre-distribution scheme for trusted devices
    Ramkumar, M
    Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2005, : 142 - 149
  • [6] A scheme of hidden-structure attribute-based encryption with multiple authorities
    Ling, J.
    Weng, A. X.
    INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION AND AUTOMATION ENGINEERING, 2018, 359
  • [7] A differentialized service providing scheme on trusted relay quantum key distribution networks
    Sun, Yong-Mei
    Cheng, Xian-Zhu
    Ji, Yue-Feng
    Guangzi Xuebao/Acta Photonica Sinica, 2014, 43 (07):
  • [8] Improved Trusted Storage Key Authorization Management Scheme Based on Timestamp
    Zhai, Guang-hui
    Li, Juan
    Song, Cheng
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 327 - +
  • [9] A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain
    Yang, Xiaohui
    Li, Wenjie
    Fan, Kai
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (01) : 107 - 125
  • [10] A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain
    Xiaohui Yang
    Wenjie Li
    Kai Fan
    Peer-to-Peer Networking and Applications, 2023, 16 : 107 - 125