Username   Password       Forgot your password?  Forgot your username? 

 

An Attribute Key Distribution Scheme based on Low Dependence Trusted Authorities

Volume 14, Number 11, November 2018, pp. 2643-2651
DOI: 10.23940/ijpe.18.11.p10.26432651

Xuewang Zhanga,b, Wei Wanga, and Jinzhao Linb,c

aSchool of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China
bCollege of Communication Engineering, Chongqing University, Chongqing, 400044, China
cChongqing Key Laboratory of Photoelectronic Information Sensing and Transmitting Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China

(Submitted on August 22, 2018; Revised on September 16, 2018; Accepted on October 12, 2018)

Abstract:

Aiming at the problem of “authority deception” and attribute restoration on the key distribution center, an attribute key distribution scheme under the environment of low reliance on trusted authorities is proposed in this paper. In this scheme, the users’ attributes are generated by the Cloud Storage Service Provider (CSSP), and then the attributes are divided into several attribute blocks and distributed to users. The user exchanges attribute blocks with other users and restore the attributes through the Chinese remainder theorem after receiving the attribute blocks. The multiple Key Management Centers (KMC) generate the attribute parameters according to the user attributes, and the last user calculates the attribute keys through the received attribute parameters. This scheme avoids the problem of “authority deception” and has high computational efficiency. Finally, the experimental results show that the program is safe and efficient.

 

References: 14

                  1. K. Han, Q. B. Li, and Z. L. Deng, “Security and Efficiency Data Sharing Scheme for Cloud Storage,” Chaos, Solitons and Fractals, Vol. 86, No. 6, pp. 107-116, 2016
                  2. A. Sahai and B. Waters, “Fuzzy Identity-based Encryption,” in Proceedings of Annual International Conferences on the Theory and Applications of Cryptographic Techniques, pp. 457-473, 2005
                  3. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based Encryption for Finegrained Access Control of Encrypted Data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria: ACM Press, pp. 89-98, 2006
                  4. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-based Encryption,” in Proceedings of 2007 IEEE Symposium on Security and Privacy (S&P 2007), Berkeley: IEEE Press, pp. 321-334, 2007
                  5. M. Li, S. C. Yu, and Y. Zheng, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-based Encryption,” IEEE Transactions on Parallel & Distributed Systems, Vol. 24, No. 1, pp. 131-143, 2012
                  6. Q. Liu, G. J. Wang, and J. Wu, “Time-based Proxy Re-Encryption Scheme for Secure Data Sharing in a Cloud Environment,” Information Sciences, Vol. 238, No. 3, pp. 355-370, 2014
                  7. A. Lewko and B. Waters, “Decentralizing Attribute-based Encryption,” Paterson, K.G. (eds) Advances in Cryptology-EUROCRYPT 2011, LNCS, Tallinn: Springer Press, Vol. 6632, pp. 568-588, 2011
                  8. I. Ray and N. Narasimhamurthi, “A Cryptographic Solution to Implement Access Control in a Hierarchy and More,” in Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (SACMAT 2002), Monterey: ACM Press, pp. 65-73, 2002
                  9. R. Sushmita, N. Amiya, and S. Ivan, “DACC: Distributed Access Control in Clouds,” in Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), Changsha: IEEE Press, pp.91-98, 2011
                  10. L. N. Lei and Y. Li, “CP-ABE based Data Access Control Scheme with Multi-Authorities,” Application Research of Computers, Vol. 35, No. 1, pp. 248-252:276, 2018
                  11. L. J. Xie, Z. Q. Zhu, L. Sun, and N. Pan, “Research and Design of Cloud Computing Key Management Framework,” Application Research of Computers, Vol. 30, No. 3, pp. 909-912, 2013
                  12. A. SuphaLakshmi and M. Revathi, “Secure Data Sharing Using 3-Party Decentralized Communication,” in Proceedings of 2016 10th International Conference on Intelligent Systems and Control (ISCO 2016), Coimbatore: IEEE Press, pp. 1-5, 2016
                  13. S. Han, “Research on Key Technologies of Secured Data Sharing in Cloud Storage,” Ph.D. Thesis, Beijing University of Posts and TeleCommuncations, pp. 16-32, 2015
                  14. Y. Wang, Z. F. Hou, X. Q Zhang, and M. J. Huang, “Threshold Signature Scheme based on Chinese Remainder Theorem Without a Trusted Party,” Journal of Computer Applications, Vol. 38, No. 4, pp. 1041-1045, 2018

                                   

                                  Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                                  Attachments:
                                  Download this file (IJPE-2018-11-10.pdf)IJPE-2018-11-10.pdf[An Attribute Key Distribution Scheme based on Low Dependence Trusted Authorities]741 Kb
                                   
                                  This site uses encryption for transmitting your passwords. ratmilwebsolutions.com