A New Key-Aggregate Encryption Scheme with Chosen Ciphertext Security

被引:0
作者
Lan, Caihui [1 ]
Li, Haifeng [2 ]
Wang, Caifen [3 ]
机构
[1] Lanzhou City Univ, Coll Informat Engn, Lanzhou, Peoples R China
[2] Dalian Univ Technol, Sch Software, Dalian, Peoples R China
[3] Northwest Normal Univ, Comp Sci & Engn, Lanzhou, Peoples R China
来源
2016 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST) | 2016年
关键词
key-aggregate encryption; chosen ciphertext attack (CCA); the random oracle model (ROM);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a key-aggregate encryption scheme, different secret keys for decrypting different categories of ciphertext can be aggregated to a single key, and a ciphertext can be decrypted with the key iff the ciphertext's class belongs to the set which the key includes categories. A promising application of key-aggregate encryption is convenient of data sharing in outside storage. In this work, the authors propose a new key-aggregate encryption scheme. The new scheme is chosen ciphertext secure in ROM and easy to append an additional new class.
引用
收藏
页码:229 / 233
页数:5
相关论文
共 10 条
[1]  
[Anonymous], LNCS
[2]   Dynamic and Efficient Key Management for Access Hierarchies [J].
Atallah, Mikhail J. ;
Blanton, Marina ;
Fazio, Nelly ;
Frikken, Keith B. .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage [J].
Chu, Cheng-Kang ;
Chow, Sherman S. M. ;
Tzeng, Wen-Guey ;
Zhou, Jianying ;
Deng, Robert H. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) :468-477
[5]   Arbitrary-State Attribute-Based Encryption with Dynamic Membership [J].
Fan, Chun-I ;
Huang, Vincent Shi-Ming ;
Ruan, He-Ming .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (08) :1951-1961
[6]  
Goyal V., 2006, 13 ACM CONFCOMPUT CO, P89, DOI DOI 10.1145/1180405.1180418
[7]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221
[8]  
Ostrovsky K., 2007, P ACM C COMPT COMM S, P195
[9]   Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing [J].
Yu, Shucheng ;
Wang, Cong ;
Ren, Kui ;
Lou, Wenjing .
2010 PROCEEDINGS IEEE INFOCOM, 2010,
[10]  
Yuan Q., 2015, Intelligent Computation in Big Data Era, 2015, P344