排序方式: 共有1条查询结果,搜索用时 15 毫秒
1
1.
Distributed information systems require complex access control which depends upon attributes of protected data and access
policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to
check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are
stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control
mechanism over encrypted data by specifying the users’ attributes. According to this mechanism, even though the file server
is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability
in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security
that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions
realize revocation of the users’ key. This paper presents an ABE scheme that supports revocation and has full security in
adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security. 相似文献
1