Verifiable multi-authority attribute based encryption scheme with different permissions

نویسندگان

  • Xueyan Liu
  • Zhanming Li
  • Zhanjun Hao
  • Qiang Zhang
چکیده

In this paper, we study the traffic information granular computing theory and build traffic information fusion model, framework and implementation program based on granular computing. We raise uncertainty reduction algorithms for traffic flow prediction and congestion recognition algorithms based on granular computing theory, which will provide new ideas and methods in the complex decision making under uncertainty problems of the transportation systems. In an attribute based encryption scheme, each user is identified by a set of attributes, which are used to determined ecryption ability for each ciphertext. On the base of attribute based encryption and symmetric encryption algorithm, it proposes a verifiable multi-authority attribute based encryption scheme. In our scheme, access control permission is divided into two kinds: Read and Write for the first time. An encryptor can easily deal with this problem by using two different secret keys. When a user wants to get Read permission, he just needs to go to some authorities, yet not all. We also provide a verification scheme that ensures the integrity of data and realness of data sources. The encryptor generates a signature while encryption, the user carries out verification with given signature and the decrypted message. The scheme not only enhances the confidentiality of data, but also supports more flexible and more fine-grained access control strategy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Outsourcing Decryption of Multi-Authority ABE Ciphertexts

The notion of multi-authority attribute based encryption was introduced by Chase in TCC 2007. In this paper, we improve Chase’s scheme to allow encryptors to determine how many attributes are required for each ciphertext from related attribute authorities. The proposed scheme can be seen as a multi-trapdoor construction. Furthermore, we apply the LMSSS to outsource the decryption of multi-autho...

متن کامل

User Revocation Based Anonymous Access Provision for Efficient Cloud User Privacy

Cloud computing is a recent technology provides a flexible, on-demand and low cost feature of computing resources. The Main issue in Cloud Computing is user identity privacy and data content privacy. The User Privacy in Cloud Computing is achieved by various data access control Schemes. Existing Fully Anonymous Access control scheme with decentralized attribute authority provides data content p...

متن کامل

The Research on Multi-Authority Based Weighted Attribute Encryption Algorithm in the Cloud Computing Environment

In the cloud right weight attribute encryption scheme based on multi-agency. Under existing cloud computing environment based on multi-agency access control scheme generally do not take into account the weights of the attributes that the status attributes are equal. But in real life, with the right to property values are meaningful. Each attribute in the system that served as different roles, t...

متن کامل

A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environm...

متن کامل

Investigating the Approaches for improving the Ciphertext Policy Attribute Based Encryption schemes

Ciphertext policy attribute based encryption (CP-ABE) is a technique in which a user with a secret key (containing attributes) is able to decrypt a message only if the attributes in the policy match those defined in the secret key. The existing methods that use reasonably computable decryption policies for CP-ABE, produce the ciphertext of size at least linearly varying with the number of attri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014