An attribute key distribution scheme based on low dependence trusted authorities

被引:0
|
作者
Zhang X. [1 ,2 ]
Wang W. [1 ]
Lin J. [2 ,3 ]
机构
[1] School of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing
[2] College of Communication Engineering, Chongqing University, Chongqing
[3] Chongqing Key Laboratory of Photoelectronic Information Sensing and Transmitting Technology, Chongqing University of Posts and Telecommunications, Chongqing
关键词
Attribute-based key; Cloud storage; Low dependence; Trusted authority;
D O I
10.23940/ijpe.18.11.p10.26432651
中图分类号
学科分类号
摘要
Aiming at the problem of “authority deception” and attribute restoration on the key distribution center, an attribute key distribution scheme under the environment of low reliance on trusted authorities is proposed in this paper. In this scheme, the users’ attributes are generated by the Cloud Storage Service Provider (CSSP), and then the attributes are divided into several attribute blocks and distributed to users. The user exchanges attribute blocks with other users and restore the attributes through the Chinese remainder theorem after receiving the attribute blocks. The multiple Key Management Centers (KMC) generate the attribute parameters according to the user attributes, and the last user calculates the attribute keys through the received attribute parameters. This scheme avoids the problem of “authority deception” and has high computational efficiency. Finally, the experimental results show that the program is safe and efficient. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:2643 / 2651
页数:8
相关论文
共 50 条
  • [21] Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network
    Wen Hao
    Han ZhengFu
    Zhao YiBo
    Guo GuangCan
    Hong PeiLin
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009, 52 (01): : 18 - 22
  • [22] Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size
    Li, Cong
    Wang, Xu An
    Sangaiah, Arun Kumar
    Yang, Haibing
    Shan, Chun
    ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES, 2018, 17 : 792 - 800
  • [23] Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network
    Hao Wen
    ZhengFu Han
    YiBo Zhao
    GuangCan Guo
    PeiLin Hong
    Science in China Series F: Information Sciences, 2009, 52 : 18 - 22
  • [24] Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network
    WEN Hao HAN ZhengFu ZHAO YiBo GUO GuangCan HONG PeiLin Key Lab of Quantum Information Chinese Academy of Sciences University of Science and Technology of China Hefei China Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei China
    Science in China(Series F:Information Sciences), 2009, 52 (01) : 18 - 22
  • [25] Efficient key-policy attribute-based encryption scheme
    Xu, Zhiqin
    Zhang, Leyou
    ICIC Express Letters, 2015, 9 (01): : 31 - 35
  • [26] Accountable attribute-based encryption scheme without key escrow
    Zhang, Xing
    Wen, Zilong
    Shen, Qingni
    Fang, Yuejian
    Wu, Zhonghai
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2293 - 2303
  • [27] A trusted key management scheme for digital rights management
    Jeong, Y
    Yoon, K
    Ryou, J
    ETRI JOURNAL, 2005, 27 (01) : 114 - 117
  • [28] Polynomial Based Key Distribution Scheme for WPAN
    Vimalathithan, R.
    Rossi, D.
    Omana, M.
    Metra, C.
    Valarmathi, M. L.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2013, 7 : 59 - 72
  • [29] Identity Based Group Key Distribution Scheme
    Wang H.
    Qin W.
    Liu Q.
    Yu C.
    Shen Z.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (10): : 2203 - 2217
  • [30] A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing
    Qin, Xuanmei
    Huang, Yongfeng
    Yang, Zhen
    Li, Xing
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 112