Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage

被引:1
|
作者
Zhang, Qiuyu [1 ]
Zhao, Zhenyu [1 ]
Fu, Minrui [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
基金
中国国家自然科学基金;
关键词
USER REVOCATION;
D O I
10.1155/2021/9606240
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to ensure the confidentiality and secure sharing of speech data, and to solve the problems of slow deployment of attribute encryption systems and fine-grained access control in cloud storage, a speech encryption scheme based on ciphertext policy hierarchical attributes was proposed. First, perform hierarchical processing of the attributes of the speech data to reflect the hierarchical structure and integrate the hierarchical access structure into a single-access structure. Second, use the attribute fast encryption framework to construct the attribute encryption scheme of the speech data, and use the integrated access to the speech data; thus, the structure is encrypted and uploaded to the cloud for storage and sharing. Finally, use the hardness of decisional bilinear Diffie-Hellman (DBDH) assumption to prove that the proposed scheme is secure in the random oracle model. The theoretical security analysis and experimental results show that the proposed scheme can achieve efficient and fine-grained access control and is secure and extensible.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage
    Wang, Shangping
    Guo, Keke
    Zhang, Yaling
    PLOS ONE, 2018, 13 (09):
  • [2] Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1860 - 1865
  • [3] Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [4] Ciphertext-policy weighted attribute based encryption scheme
    Liu, Ximeng
    Ma, Jianfeng
    Xiong, Jinbo
    Li, Qi
    Zhang, Tao
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2013, 47 (08): : 44 - 48
  • [5] Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing
    Guan, Zhitao
    Li, Jing
    Zhang, Zijian
    Zhu, Liehuang
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [6] A Regulation Scheme Based on the Ciphertext-Policy Hierarchical Attribute-Based Encryption in Bitcoin System
    Wang, Yuxiao
    Gao, Juntao
    IEEE ACCESS, 2018, 6 : 16267 - 16278
  • [7] Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
    Yu, Gang
    Wang, Yongjuan
    Cao, Zhenfu
    Lin, Jian
    Wang, Xiangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [8] Research on Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage
    Wang, Guangbo
    Wang, Jianhua
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [9] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong CHENG
    Zhi-ying WANG
    Jun MA
    Jiang-jiang WU
    Song-zhu MEI
    Jiang-chun REN
    Frontiers of Information Technology & Electronic Engineering, 2013, (02) : 85 - 97
  • [10] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Cheng, Yong
    Wang, Zhi-ying
    Ma, Jun
    Wu, Jiang-jiang
    Mei, Song-zhu
    Ren, Jiang-chun
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (02): : 85 - 97