浏览全部资源
扫码关注微信
[ "吴国威(1991- ),男,现就职于中国电信股份有限公司广州研究院,主要研究方向为云计算安全、密码学与信息安全" ]
[ "樊宁(1983- ),女,现就职于中国电信股份有限公司广州研究院,主要研究方向为网络安全、SDN安全及NFV安全解决方案" ]
[ "汪来富(1976- ),男,中国电信股份有限公司广州研究院高级工程师,主要研究方向为云计算安全、大数据安全、物联网安全" ]
[ "王帅(1979- ),女,中国电信股份有限公司广州研究院高级工程师,主要研究方向为大数据安全、云计算安全、网络与信息安全体系及攻防技术" ]
[ "沈军(1976- ),女,现就职于中国电信股份有限公司广州研究院,主要研究方向为SDN领域、大数据安全、云计算安全及移动互联网安全" ]
[ "金华敏(1972- ),男,中国电信股份有限公司广州研究院高级工程师,主要研究方向为网络与信息安全、云计算安全。" ]
网络出版日期:2019-11,
纸质出版日期:2019-11-20
移动端阅览
吴国威, 樊宁, 汪来富, 等. 云环境下基于属性加密体制算法加速方案[J]. 电信科学, 2019,35(11):101-107.
Guowei WU, Ning FAN, Laifu WANG, et al. Accelerated algorithm in attribute-based encryption over cloud environment[J]. Telecommunications science, 2019, 35(11): 101-107.
吴国威, 樊宁, 汪来富, 等. 云环境下基于属性加密体制算法加速方案[J]. 电信科学, 2019,35(11):101-107. DOI: 10.11959/j.issn.1000-0801.2019145.
Guowei WU, Ning FAN, Laifu WANG, et al. Accelerated algorithm in attribute-based encryption over cloud environment[J]. Telecommunications science, 2019, 35(11): 101-107. DOI: 10.11959/j.issn.1000-0801.2019145.
云计算为租户提供存储、计算和网络服务,数据安全保护和租户间的数据共享与访问控制是其必不可少的能力。基于属性的加密体制是一种一对多的加密体制,可以根据用户属性实现细粒度访问控制,适用于云计算环境多租户数据共享。但现有的基于属性加密体制的算法效率较低,难以在实际环境中应用。分析了基于属性的加密体制的两种类型及其应用场景,提出一个基于属性加密体制算法的加速方案。通过实验表明,提出的方案可提高基于属性加密体制的密钥生成算法、加密算法和解密算法的效率。
Cloud computing provides storage
computing and network services to tenants.Data security and data sharing and access control between tenants are indispensable functions.Attribute-based encryption (ABE) system is a one to many encryption system
which allows users to fine -grained access control on encrypted data according to users’ attributes.This encryption system is very suitable for multi-tenant data sharing overcloud computing environment.However
the existing attribute-based encryption schemes is inefficient
which cannot be applied to practical applications.Two types of ABE and their application scenarios were analyzed
and an acceleration algorithms scheme in attribute encryption cryptosystem was proposed.The experiment can illustrate that the proposed scheme can improve the efficiency of key generation algorithm
encryption algorithm and decryption algorithm.
SAHAI A , WATERS B . Fuzzy identity-based encryption [C ] // Annual International Conference on the Theory and Applications of Cryptographic Techniques,May 22-26,2005,Aarhus,Denmark . Heidelberg:Springer , 2005 : 457 - 473 .
HOHENBERGER S , WATERS B . Attribute-based encryption with fast decryption [C ] // Public-Key Cryptography-PKC 2013 . Heidelberg:Springer , 2013 : 162 - 179 .
HOHENBERGER S , WATERS B . Online/offline attributebased encryption [M ] // International Workshop on Public Key Cryptography,Mar 26-28,2014,Buenos Aires,Argentina . Heidelberg:Springer , 2014 : 293 - 310 .
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts [C ] // Usenix Conference on Security,Aug8-12,2011,San Francisco,USA . Berkeley:USENIX Association , 2011 :34.
WATERS B , . Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization [C ] // International Workshop on Public Key Cryptography,March 6-9,2011,Taormina,Italy . Heidelberg:Springer , 2011 : 53 - 70 .
李子姝 , 谢人超 , 孙礼 , 等 . 移动边缘计算综述 [J ] . 电信科学 , 2018 , 34 ( 1 ): 87 - 101 .
LI Z S , XIE R C , SUN L , et al . A survey of mobile edge computing [J ] . Telecommunications Science , 2018 , 34 ( 1 ): 87 - 101 .
朱友康 , 乐光学 , 杨晓慧 , 等 . 移动边缘迁移研究综述 [J ] . 电信科学 , 2019 , 35 ( 4 ): 74 - 94 .
ZHU Y K , LE G X , YANG X H , et al . A survey on edge computing offloading [J ] . Telecommunications Science , 2019 , 35 ( 4 ): 74 - 94 .
0
浏览量
286
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构