Int J Performability Eng ›› 2018, Vol. 14 ›› Issue (11): 2643-2651.doi: 10.23940/ijpe.18.11.p10.26432651

Previous Articles     Next Articles

An Attribute Key Distribution Scheme based on Low Dependence Trusted Authorities

Xuewang Zhanga, b, *, Wei Wanga, and Jinzhao Linb, c   

  1. a School of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China;
    b College of Communication Engineering, Chongqing University, Chongqing, 400044, China;
    c Chongqing Key Laboratory of Photoelectronic Information Sensing and Transmitting Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China
  • Submitted on ;
  • Contact: * E-mail address: zhangxw@cqupt.edu.cn
  • About author:Xuewang Zhang received his Master's degree from Central South University of Forestry, Changsha, China, in 2003, and he was a doctoral candidate at Chongqing University, China, in 2015. He is currently an associate professor at Chongqing University of Posts and Communications. He is also a senior member of the China Computer Federation and a member of IEEE. His current research interests include big data, blockchain, data security, privacy protection, and Internet software and security.Wei Wang is a Master's student in the College of Software Engineering at Chongqing University of Posts and Communications. Her research interests include Internet software and security, data security, and privacy protection. Jinzhao Lin obtained his Ph.D. from Chongqing University in 2001. He is currently a professor at Chongqing University of Posts and Telecommunications. He is also a doctoral director at Chongqing University and Chongqing University of Posts and Telecommunications. His main research interests include wireless communications, digital signal processing, and circuit design.

Abstract: Aiming at the problem of “authority deception” and attribute restoration on the key distribution center, an attribute key distribution scheme under the environment of low reliance on trusted authorities is proposed in this paper. In this scheme, the users’ attributes are generated by the Cloud Storage Service Provider (CSSP), and then the attributes are divided into several attribute blocks and distributed to users. The user exchanges attribute blocks with other users and restore the attributes through the Chinese remainder theorem after receiving the attribute blocks. The multiple Key Management Centers (KMC) generate the attribute parameters according to the user attributes, and the last user calculates the attribute keys through the received attribute parameters. This scheme avoids the problem of “authority deception” and has high computational efficiency. Finally, the experimental results show that the program is safe and efficient.

Key words: cloud storage, attribute-based key, trusted authority, low dependence