Font Size: a A A

Research On Attribute-based Encryption Based On Asymmetric Order Groups With User Traceability

Posted on:2022-10-24Degree:MasterType:Thesis
Country:ChinaCandidate:Y X YeFull Text:PDF
GTID:2518306479493474Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the field of public-key encryption,attribute-based encryption has attracted much attention in recent years.Attribute-based encryption implements fuzzy identity access control,which can better adapt to complex access control scenarios.However,the existing attribute-based encryption schemes still have many problems in applications.Most of the existing schemes for implementing attribute-based encryption are one-to-one correspondence between attributes and group elements and publicly disclosed by public parameters.In other words,changes in the size of the system's global attribute set will directly lead to changes in the size of public parameters.In addition,the original idea of the attribute-based encryption system is to obscure the relationship between the user's identity and the authority to associate the authority split with the user's attributes.Under such authorization logic,the permissions granted to different users with the same attribute set are indistinguishable.Then it will be difficult to avoid risks in a time when malicious users or abuse of permissions appear in the system.In view of the above problems,this article gives some solutions.Details are as follows:1.In the "white-box" tracing scenario,this paper proposes a key-policy attributebased encryption scheme with a public user tracing function.This solution embeds user identity information in the user key and adds a publicly executable key compliance check algorithm on the basis of the standard attribute-based system.This key compliance check algorithm realizes the validity check of the key and the extraction of user identity information in the key.In addition,the paper also gives complete security proof,which proves that the scheme has an effective user tracing function and is adaptively secure.Finally,through comparison with related programs,the efficiency of schemes in terms of transmission,storage,and operation is evaluated.2.In the "black-box" tracing scenario with more stringent requirements and less information available,this paper also proposes a key-policy attribute-based encryption scheme with a public user tracing function.The scheme associates the user's authority with the matrix location by establishing a matrix-type user list and implements the user tracking algorithm.This user tracing algorithm running in a "black-box" scenario interacts with a "black-box" with decryption capabilities,and finally outputs a list of users who make up the "black-box" decryption capabilities.After that,this paper proves the scheme not only has an effective and anti-collusion user tracing function but also is adaptively secure by complete security proof.Finally,the practical value of the program is analyzed by comparing it with related programs.
Keywords/Search Tags:Attribute-based Encryption, Large Universe, Unbounded, Key-policy, Public Encryption
PDF Full Text Request
Related items