Font Size: a A A

Attribute-based Encryption And Its Application

Posted on:2013-01-20Degree:MasterType:Thesis
Country:ChinaCandidate:R G ZhangFull Text:PDF
GTID:2218330374464908Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Users in the Attribute-Based Encryption(ABE) system replace the unique ID or certificate with a set of attributes. The introduction of the threshold gate has enhanced the flexibility of access control. ABE can not only achieve fine-grained data access control, but also has a good application in broadcast encryption.First, this article summarizes the development of fuzzy identity-based encryption. Two basic algorithms of ABE:ciphertext-policy attribute-based encryption and key-policy attribute-based encryption are studied and analyzed in this article. Then We analyze and compare the existing programs of ABE involving dynamic properties, key revocation and policy hidden, etc. And we apply ABE with AES to Direct Load Control(DLC) combinating of the application requirements in demand-side management. When the power system is required to reduce load, the DLC actuator encrypts the interrupt instruction with access policy, and then broadcasts the ciphertext to the users in a certain area. An intelligent device based on ARM is used to receive ciphertexts in the user side. As the instruction is encrypted under Ciphertext-Policy Attribute-Based Encryption(CPABE) such that only those whose attributes match the access policy are able to decrypt the ciphertext and then the corresponding load is cut off. In the process of communication, messages are transmitted in the form of cipher, so the security and reliability can be guaranteed.Finally, the DLC system based on ABE is summarized and concluded, and the proposed scheme is simulated and analyzed.
Keywords/Search Tags:Attribute-Based Encryption(ABE), information security, Demand SideManagement(DSM), Direct Load Control(DLC)
PDF Full Text Request
Related items