分层的属性加密机制研究
[Abstract]:Attribute encryption mechanism is a new type of public key encryption supporting many-to-many modes. In the attribute encryption mechanism, identity information is no longer represented by an element, but a flexible access structure is added, which is composed of several attributes and thresholds. If and only if the access structure matches the attribute set, it can be decrypted successfully. The biggest advantage of the attribute encryption mechanism is that it does not need to specify who decrypts, so long as the receiver meets the corresponding conditions can be decrypted. Generally, attribute encryption is divided into two categories: attribute encryption based on key policy and attribute encryption based on ciphertext policy. This thesis will focus on the attribute encryption mechanism based on key policy. This paper firstly introduces the attribute encryption mechanism. The attribute encryption mechanism can be divided into basic attribute encryption mechanism and attribute encryption mechanism based on key policy. The attribute encryption mechanism based on ciphertext policy and the attribute encryption mechanism based on stratification of attribute set are described in detail in this paper. Secondly, the attribute encryption mechanism based on key policy and attribute encryption mechanism based on attribute set are introduced. The main advantage of attribute encryption mechanism based on key policy is that it adds an access structure. This access structure can make access control more flexible. The advantage of attribute encryption mechanism is that it can solve the problem of low efficiency caused by extensive pairing operation and improve the efficiency of the algorithm. Because unstratified attribute encryption requires a generated subkey for each attribute during key generation, for hierarchical attribute encryption, only the attributes of the ancestor nodes shared by several attributes are required. And generate the key for the attribute of the ancestor node. Finally, an improved hierarchical attribute encryption scheme based on key policy is proposed on the basis of the above work. (1) access structure is introduced into the scheme, and the access structure is embedded in the key. By controlling the structure by the key holder, the flexibility of access control is improved. (2) the attributes in the attribute set are divided into tree structure, each attribute is no longer a separate individual, If x is a node in an attribute tree, then the attributes of the nodes in the same attribute tree that are deeper than x have them, so there is no need for a one-to-one pairing operation. For a user to have several attributes of nodes deeper than x in the same attribute tree, you do not need to have each attribute; you simply have the attributes of the x node Its advantage is to solve the problem that attribute encryption is inefficient due to extensive matching operations. (3) Security proof and efficiency analysis are carried out.
【学位授予单位】:西安电子科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN918.4
【相似文献】
相关期刊论文 前10条
1 金永涛 ,白焰;新颖的子目录加密机制[J];电脑编程技巧与维护;1994年08期
2 金永涛 ,白焰;新颖的子目录加密机制[J];电脑编程技巧与维护;1994年02期
3 李建峰;谈信用卡系统中的信息加密机制[J];电脑与信用卡;1996年04期
4 石军;;城市轨道交通信号系统网络传输安全加密机制讨论[J];科技信息;2013年06期
5 单康康;江肖强;;混合加密机制降低计算复杂度[J];中国教育网络;2011年Z1期
6 武蓓;王劲林;倪宏;陈君;;一种广播加密机制的树再生长方法[J];计算机工程;2007年22期
7 张衡,张玉芳;具有加密机制的防火墙在零售行业中的应用[J];计算机工程与设计;2005年08期
8 崔国华,洪帆,付小青,胡伦骏;数据库系统中一种更安全的加密机制[J];华中理工大学学报;2000年07期
9 李尚;纵姝洁;肖汉;;一种XML报警消息的加密机制研究[J];微计算机信息;2008年24期
10 谢学智;李春晓;;属性加密机制在电子政务中的应用[J];中国科技论文;2013年01期
相关会议论文 前3条
1 赵洋;秦志光;蓝天;王佳昊;;基于可验证加密机制的多方公平交换协议[A];全国网络与信息安全技术研讨会论文集(下册)[C];2007年
2 周香凝;;一种支持快速查询的敏感数据加密机制[A];计算机技术与应用进展——全国第17届计算机科学与技术应用(CACIS)学术会议论文集(下册)[C];2006年
3 单康康;江肖强;;混合加密机制在DNSSEC中的应用研究[A];中国高等教育学会教育信息化分会第十次学术年会论文集[C];2010年
相关重要报纸文章 前1条
1 马云飞;WLAN安全要等一年[N];中国计算机报;2003年
相关硕士学位论文 前2条
1 张冠群;分层的属性加密机制研究[D];西安电子科技大学;2014年
2 王雅宁;数字集群通信系统加密机制的研究[D];哈尔滨工业大学;2006年
,本文编号:2382152
本文链接:https://www.wllwen.com/kejilunwen/wltx/2382152.html