Liang-Ao Zhang, Xingming Sun, Zhihua Xia, Qiuju Ji
언어
영어(ENG)
URL
https://www.earticle.net/Article/A252505
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
원문정보
초록
영어
Attribute-Based Encryption (ABE) is a promising cryptographic primitive to implement access control for secure data storage in the cloud. Since the data owner may frequently change the access policies defined in the ciphertext, it is significant to provide the capacity for dynamic policy updating. However the cloud should also authenticate the owner because the adversary may modify the access policies of the files in the cloud to prevent the legal users from accessing them. In this paper, we focus on the owner’s authentication in the ABE systems and propose a novel scheme which enables access control with authenticated dynamic policy updating in the cloud. We adapt the Pedersen commitment and Zero Knowledge Proof of Knowledge (ZKPK) to realize the anonymous authentication of the owner’s policy updating key without increasing any secret information to the owner side. The analysis shows that our scheme is authentic and efficient as well as adaptive to different types of access policies.
목차
Abstract 1. Introduction 1.1. Related Work 1.2. Organization 2. Preliminaries 2.1. Access Structures 2.2. Pedersen Commitment 2.3. Zero-knowledge Proof of Knowledge (ZKPK) Protocol 3. System and Security Model 3.1. System Model 3.2. Security Model 4. Access Control System with Authenticated Dynamic Policy Updating 4.1. System Initialization 4.2. Key Generation 4.3. Data Encryption 4.4. Data Decryption 4.5. Policy Updating 5. Analysis of Our Scheme 5.1. Security 5.2. Authentication 5.3. Performance Analysis 6. Conclusion Acknowledgements References
Liang-Ao Zhang [ Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, China, School of Computer & Software, Nanjing University of Information Science & Technology, China ]
Xingming Sun [ Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, China, School of Computer & Software, Nanjing University of Information Science & Technology, China ]
Zhihua Xia [ Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, China, School of Computer & Software, Nanjing University of Information Science & Technology, China ]
Qiuju Ji [ School of Computer & Software, Nanjing University of Information Science & Technology, China ]
보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Security and Its Applications
간기
격월간
pISSN
1738-9976
수록기간
2008~2016
등재여부
SCOPUS
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Security and Its Applications Vol.9 No.8