An attribute key distribution scheme based on low dependence trusted authorities

被引:0
|
作者
Zhang X. [1 ,2 ]
Wang W. [1 ]
Lin J. [2 ,3 ]
机构
[1] School of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing
[2] College of Communication Engineering, Chongqing University, Chongqing
[3] Chongqing Key Laboratory of Photoelectronic Information Sensing and Transmitting Technology, Chongqing University of Posts and Telecommunications, Chongqing
关键词
Attribute-based key; Cloud storage; Low dependence; Trusted authority;
D O I
10.23940/ijpe.18.11.p10.26432651
中图分类号
学科分类号
摘要
Aiming at the problem of “authority deception” and attribute restoration on the key distribution center, an attribute key distribution scheme under the environment of low reliance on trusted authorities is proposed in this paper. In this scheme, the users’ attributes are generated by the Cloud Storage Service Provider (CSSP), and then the attributes are divided into several attribute blocks and distributed to users. The user exchanges attribute blocks with other users and restore the attributes through the Chinese remainder theorem after receiving the attribute blocks. The multiple Key Management Centers (KMC) generate the attribute parameters according to the user attributes, and the last user calculates the attribute keys through the received attribute parameters. This scheme avoids the problem of “authority deception” and has high computational efficiency. Finally, the experimental results show that the program is safe and efficient. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:2643 / 2651
页数:8
相关论文
共 50 条
  • [31] Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems
    Guo, Rui
    Shi, Huixian
    Zhao, Qinglan
    Zheng, Dong
    IEEE ACCESS, 2018, 6 : 11676 - 11686
  • [32] Secure Optical Networks Based on Quantum Key Distribution and Weakly Trusted Repeaters
    Elkouss, David
    Martinez-Mateo, Jesus
    Ciurana, Alex
    Martin, Vicente
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2013, 5 (04) : 316 - 328
  • [33] An Attribute Credential Based Public Key Scheme for Fog Computing in Digital Manufacturing
    Yao, Xuanxia
    Kong, Huafeng
    Liu, Hong
    Qiu, Tie
    Ning, Huansheng
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (04) : 2297 - 2307
  • [34] Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test
    Liao, Yongjian
    Chen, Hongjie
    Li, Fagen
    Jiang, Shaoquan
    Zhou, Shijie
    Mohammed, Ramadan
    IEEE ACCESS, 2018, 6 : 10189 - 10196
  • [35] Key-policy attribute-based encryption scheme for general circuits
    Hu P.
    Gao H.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 (06): : 1498 - 1510
  • [36] A ciphertext policy attribute based signcryption scheme with secure and flexible key evolving
    Hong, Hanshu
    Zhou, Xiaokang
    Hu, Bing
    Sun, Zhixin
    2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 413 - 418
  • [37] KEY-POLICY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR GENERAL CIRCUITS
    Bolocan, Diana
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2020, 21 (01): : 11 - 19
  • [38] RANDOM KEY PRE-DISTRIBUTION SCHEME BASED ON KEY UPDATING
    Zhu Ling-Zhi
    He Rui
    Zhang Jun-Ling
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2016, 9 (02) : 979 - 996
  • [39] A key distribution scheme based on public key cryptography for sensor networks
    Li, Xiaolong
    Lin, Yaping
    Yang, Siqing
    Yi, Yeqing
    Yu, Jianping
    Lu, Xinguo
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 725 - +
  • [40] Public key based key distribution scheme for wireless sensor networks
    Huang, Jie
    Huang, Bei
    Tongxin Xuebao/Journal on Communications, 2011, 32 (10): : 52 - 58