Font Size: a A A

Research On File Hierarchical Attribute-based Encryption Scheme

Posted on:2022-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:J Z LiuFull Text:PDF
GTID:2518306566497114Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Cloud storage is a core component of cloud computing.Whether information is stored,processed,and applied on cloud devices,or transmitted on a communication network,there might be problems with information tampering,information leakage,and storage security.In order to ensure that the data stored on the server will not be damaged by other users or malicious servers,the user must encrypt the data before storing it.At the same time,in order to control data access,access control must be used to protect the data content being accessed.The attribute-based encryption technology with access structure realizes fine-grained access control to users.However,in the traditional attribute-based encryption scheme,the connection between different attributes of users is not considered.In actual application scenarios,different attributes of users are often classified according to their importance levels,and the hierarchical description of attribute levels makes access control strategies more flexible and efficient.The file hierarchical attribute-based encryption technology defines a hierarchical access structure.The attributes of users are divided into levels according to their importance.When decrypting,users must meet the corresponding level nodes in the access structure.File hierarchical attribute-based encryption technology integrates access structures with hierarchical relationships,and uses the integrated access structure to encrypt files,saving computing and communication costs.This article conducts in-depth research on the file hierarchical attribute-based encryption mechanism,including:(1)In view of the high computational cost and high complexity of attribute revocation in the existing file hierarchical attribute-based encryption schemes,re-encryption technology and attribute binary tree technology are used to propose a revocable file hierarchical attribute encryption scheme.The security analysis shows that the proposed scheme based on the decisional bilinear Diffie-Hellman assumption in the standard model satisfies the indistinguishability under the adaptive choosen plaintext attack.Performance analysis shows that the proposed scheme achieves efficient attribute revocation,and achieves efficient calculation efficiency and lower communication cost.(2)In view of the high computational cost and high complexity of attribute revocation in the existing multi-authority file hierarchical attribute-based encryption scheme,re-encryption technology and outsourced pre-decryption technology are used to propose a revocable multi-authority file hierarchical attribute-based encryption scheme.Security analysis shows that the proposed scheme based on the decisional bilinear Diffie-Hellman assumption in the standard model satisfies the indistinguishability under the adaptive choosen plaintext attack and can resist collusion attacks.Performance analysis shows that the proposed scheme achieves efficient attribute revocation,and achieves efficient calculation efficiency and lower communication cost.
Keywords/Search Tags:Attribute-based encryption, File hierarchical attribute-based encryption, Multiple authorization, Attribute revocation
PDF Full Text Request
Related items