An attribute key distribution scheme based on low dependence trusted authorities

被引:0
|
作者
Zhang X. [1 ,2 ]
Wang W. [1 ]
Lin J. [2 ,3 ]
机构
[1] School of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing
[2] College of Communication Engineering, Chongqing University, Chongqing
[3] Chongqing Key Laboratory of Photoelectronic Information Sensing and Transmitting Technology, Chongqing University of Posts and Telecommunications, Chongqing
关键词
Attribute-based key; Cloud storage; Low dependence; Trusted authority;
D O I
10.23940/ijpe.18.11.p10.26432651
中图分类号
学科分类号
摘要
Aiming at the problem of “authority deception” and attribute restoration on the key distribution center, an attribute key distribution scheme under the environment of low reliance on trusted authorities is proposed in this paper. In this scheme, the users’ attributes are generated by the Cloud Storage Service Provider (CSSP), and then the attributes are divided into several attribute blocks and distributed to users. The user exchanges attribute blocks with other users and restore the attributes through the Chinese remainder theorem after receiving the attribute blocks. The multiple Key Management Centers (KMC) generate the attribute parameters according to the user attributes, and the last user calculates the attribute keys through the received attribute parameters. This scheme avoids the problem of “authority deception” and has high computational efficiency. Finally, the experimental results show that the program is safe and efficient. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:2643 / 2651
页数:8
相关论文
共 50 条
  • [41] CPSR-HQKDN: A Hybrid Trusted Relay Quantum Key Distribution Network Routing Scheme Based on Classification of Packet Security Requirements
    Bi, Lin
    Wu, Weijie
    Yuan, Xiaotong
    Miao, Minghui
    Di, Xiaoqiang
    Jiang, Zhengang
    APPLIED SCIENCES-BASEL, 2023, 13 (22):
  • [42] An IND-CCA2 Secure Key-Policy Attribute Based Key Encapsulation Scheme
    Wang, Changji
    Liu, Yang
    Kim, Jung-Tae
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 449 - +
  • [43] A attribute reduction algorithm based on attribute dependence
    Lu, Songfeng
    Liu, Fang
    Hu, Bo
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2008, 36 (02): : 39 - 41
  • [44] A Novel Key Distribution Scheme Based on Transmission Delays
    Huang, Jie
    Wang, Xiaowen
    Wang, Wei
    Duan, Zhenyu
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [45] Security of trusted repeater quantum key distribution networks
    Salvail, Louis
    Peev, Momtchil
    Diamanti, Eleni
    Alleaume, Romain
    Luetkenhaus, Norbert
    Laenger, Thomas
    JOURNAL OF COMPUTER SECURITY, 2010, 18 (01) : 61 - 87
  • [46] Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing
    Tian, Yuan
    Zhou, Tanping
    Zhou, Xuan
    Zhong, Weidong
    Yang, Xiaoyuan
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (06)
  • [47] A trusted behaviour measurement scheme based on feedback and control in trusted network
    Zhuang J.
    Zhao X.
    Gong B.
    Zhan J.
    International Journal of Wireless and Mobile Computing, 2021, 20 (02) : 99 - 106
  • [48] A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext
    Wang, Chang-Ji
    Luo, Jian-Fa
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 447 - 451
  • [49] A Novel User Revocation Scheme for Key Policy Attribute Based Encryption in Cloud Environments
    Ren, Yifan
    Li, Jie
    Ji, Yusheng
    Das, Sajal K.
    Li, Zhetao
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [50] A key distribution scheme based on public key cryptography for wireless sensor networks
    Li, Xiaolong
    Lin, Yaping
    Yi, Yeqing
    Yu, Jianping
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1113 - 1116