分層的屬性加密機制研究
[Abstract]:Attribute encryption mechanism is a new type of public key encryption supporting many-to-many modes. In the attribute encryption mechanism, identity information is no longer represented by an element, but a flexible access structure is added, which is composed of several attributes and thresholds. If and only if the access structure matches the attribute set, it can be decrypted successfully. The biggest advantage of the attribute encryption mechanism is that it does not need to specify who decrypts, so long as the receiver meets the corresponding conditions can be decrypted. Generally, attribute encryption is divided into two categories: attribute encryption based on key policy and attribute encryption based on ciphertext policy. This thesis will focus on the attribute encryption mechanism based on key policy. This paper firstly introduces the attribute encryption mechanism. The attribute encryption mechanism can be divided into basic attribute encryption mechanism and attribute encryption mechanism based on key policy. The attribute encryption mechanism based on ciphertext policy and the attribute encryption mechanism based on stratification of attribute set are described in detail in this paper. Secondly, the attribute encryption mechanism based on key policy and attribute encryption mechanism based on attribute set are introduced. The main advantage of attribute encryption mechanism based on key policy is that it adds an access structure. This access structure can make access control more flexible. The advantage of attribute encryption mechanism is that it can solve the problem of low efficiency caused by extensive pairing operation and improve the efficiency of the algorithm. Because unstratified attribute encryption requires a generated subkey for each attribute during key generation, for hierarchical attribute encryption, only the attributes of the ancestor nodes shared by several attributes are required. And generate the key for the attribute of the ancestor node. Finally, an improved hierarchical attribute encryption scheme based on key policy is proposed on the basis of the above work. (1) access structure is introduced into the scheme, and the access structure is embedded in the key. By controlling the structure by the key holder, the flexibility of access control is improved. (2) the attributes in the attribute set are divided into tree structure, each attribute is no longer a separate individual, If x is a node in an attribute tree, then the attributes of the nodes in the same attribute tree that are deeper than x have them, so there is no need for a one-to-one pairing operation. For a user to have several attributes of nodes deeper than x in the same attribute tree, you do not need to have each attribute; you simply have the attributes of the x node Its advantage is to solve the problem that attribute encryption is inefficient due to extensive matching operations. (3) Security proof and efficiency analysis are carried out.
【學位授予單位】:西安電子科技大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TN918.4
【相似文獻】
相關期刊論文 前10條
1 金永濤 ,白焰;新穎的子目錄加密機制[J];電腦編程技巧與維護;1994年08期
2 金永濤 ,白焰;新穎的子目錄加密機制[J];電腦編程技巧與維護;1994年02期
3 李建峰;談信用卡系統中的信息加密機制[J];電腦與信用卡;1996年04期
4 石軍;;城市軌道交通信號系統網絡傳輸安全加密機制討論[J];科技信息;2013年06期
5 單康康;江肖強;;混合加密機制降低計算復雜度[J];中國教育網絡;2011年Z1期
6 武蓓;王勁林;倪宏;陳君;;一種廣播加密機制的樹再生長方法[J];計算機工程;2007年22期
7 張衡,張玉芳;具有加密機制的防火墻在零售行業(yè)中的應用[J];計算機工程與設計;2005年08期
8 崔國華,洪帆,付小青,胡倫駿;數據庫系統中一種更安全的加密機制[J];華中理工大學學報;2000年07期
9 李尚;縱姝潔;肖漢;;一種XML報警消息的加密機制研究[J];微計算機信息;2008年24期
10 謝學智;李春曉;;屬性加密機制在電子政務中的應用[J];中國科技論文;2013年01期
相關會議論文 前3條
1 趙洋;秦志光;藍天;王佳昊;;基于可驗證加密機制的多方公平交換協議[A];全國網絡與信息安全技術研討會論文集(下冊)[C];2007年
2 周香凝;;一種支持快速查詢的敏感數據加密機制[A];計算機技術與應用進展——全國第17屆計算機科學與技術應用(CACIS)學術會議論文集(下冊)[C];2006年
3 單康康;江肖強;;混合加密機制在DNSSEC中的應用研究[A];中國高等教育學會教育信息化分會第十次學術年會論文集[C];2010年
相關重要報紙文章 前1條
1 馬云飛;WLAN安全要等一年[N];中國計算機報;2003年
相關碩士學位論文 前2條
1 張冠群;分層的屬性加密機制研究[D];西安電子科技大學;2014年
2 王雅寧;數字集群通信系統加密機制的研究[D];哈爾濱工業(yè)大學;2006年
,本文編號:2382152
本文鏈接:http://www.sikaile.net/kejilunwen/wltx/2382152.html