Deterministic Attributed Based Encryption

来源 :第八届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:Heavenws
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Attribute based encryption enables data owners to share their information by specifying access control policies while outsourcing their encrypted data to the cloud.However,there are no efficient searchable schemes over encrypted data in attribute-based setting.In this paper,we propose a novel primitive called deterministic attribute based encryption (DABE ),which simultaneously supports data sharing and retrieving in time logarithmic in the size of the database.We formalize the security properties for DABE with respect to auxiliary inputs.Furthermore,we propose a generic construction in the random oracle model and a selective secure concrete Key-policy DABE in the standard model under Decisional Bilinear Diffie-Hellman assumption.
其他文献
本研究利用铁酸钴磁性纳米粒子(CoFe2O4MNPs)的过氧化物模拟酶的催化活性[1],建立了一种可视化检测血清中葡萄糖的新方法。
会议
电化学发光(ECL)是一种在电极表面由电化学反应引发的特异性化学发光现象,包括了电化学激发和化学发光检测两个过程.ECL检测具有高选择性和高灵敏度的优点,已广泛用于环境监测,临床诊断,药物分析等领域[1].我们利用蜡烛灰合成了具有高效ECL淬灭效率的新型无定形碳纳米粒子(ACNPs),ACNPs具有较好的理化性质,并显示出优于其它淬灭剂(如量子点)的淬灭能力[2].本研究中利用掺杂了金纳米粒子的壳
Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.In this paper,we propose a asymmetrical quantum encryption protocol bas
The growing popularity and application of Web services have led to an increase in attention to the vulnerability of software based on these services.Vulnerability testing examines the trustworthiness,
With the pervasiveness of Vehicle Information Svstem (VIS) and the advance of Vehicular Ad-hoc Network ( VANET).Intelli- gent TransportationSystem (ITS).which can improve road traffic and reduce the n
Revealing security vulnerabilities is one of great challenges for the Android ecosvstem Staticanalvsis is the usual approach of the securitv analysis for computer software However.it is undirected and
信任模型是解决开放式网络环境中信任问题的有效方式,信任量化是可信管理中亟待解决的关键问题.针对信任量化中动态适应能力不足,信任的有效聚合不足,激励机制考虑不足等问题,根据信任模型设计原则,本文在推荐信任量化中引入奖惩因子体现推荐实体对访问主体的直接信任的可靠程度,采用推荐实体的评价可信度来决定访问客体是否采纳推荐实体的推荐;综合信任的度量过程中采纳平衡权重因子解决直接信任和推荐信任的权重问题;最后
Trusted Platform Module (TPM) is the "root of trust" of the whole trusted computing platform.It is necessary to analyze the TPM 2.0 specifications to judge whether it has the old vulnerabilities in TP
As Cloud Computing is one of the hot and trending technologies.A large amount of sensitive information is increasingly centralized into the cloud.To preserve the datas privacy,sensitive data has to be
The anomaly detection as a kind of intrusion detection way is good at detecting the unknown attacks or new attacks,and it has attracted much attention during recent years.A new hybrid intrusion detect