• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学 ›› 2023, Vol. 45 ›› Issue (03): 443-452.

• 计算机网络与信息安全 • 上一篇    下一篇

雾计算中支持解密外包的可验证属性加密方案

段亚红1,王峥1,赵涓涓1,2,王龙2   

  1. (1.太原理工大学信息与计算机学院,山西 晋中030600;2.晋中信息学院,山西 晋中 030600)
  • 收稿日期:2022-04-02 修回日期:2022-08-31 接受日期:2023-03-25 出版日期:2023-03-25 发布日期:2023-03-22
  • 基金资助:
    山西省基础研究计划(202103021224066)

A verifiable attribute encryption scheme supporting decryption outsourcing in fog computing

DUAN Ya-hong1,WANG Zheng1,ZHAO Juan-juan1,2,WANG Long2   

  1. (1.College of Information and Computer,Taiyuan University of Technology,Jinzhong 030600;
    2.Jinzhong College of Information,Jinzhong 030600,China)
  • Received:2022-04-02 Revised:2022-08-31 Accepted:2023-03-25 Online:2023-03-25 Published:2023-03-22

摘要: 基于密文策略的属性加密方案(CP-ABE)为云存储系统提供了安全、细粒度的访问控制,但由于加/解密算法中的双线性配对运算量较大,给用户端带来了沉重的负担。为了解决上述问题,提出了一种雾计算中支持解密外包的可验证属性加密方案。方案中以线性秘密共享方案构造访问矩阵,可以灵活表达多种形式的访问策略;将部分解密运算外包给雾节点,从而降低用户端运算负担;为增强外包雾节点的可信度,通过区块链交易对雾节点存取的密文进行正确性验证,并实现访问行为的不可否认性。通过安全性与实验分析表明,该方案可抵抗选择明文攻击,且具有较高的运行效率。

关键词: 属性加密, 雾计算, 外包解密, 区块链

Abstract: The ciphertext policy-based attribute encryption scheme (CP-ABE) provides secure and fine-grained access control for cloud storage systems. However, due to the large amount of bilinear pairing operation in the encryption and decryption algorithm, it brings a heavy burden to the users. In order to solve the above problems, a verifiable attribute-based encryption scheme supporting outsourced decryption in fog computing is proposed. In the scheme, the linear secret sharing scheme is used to construct the access matrix, which can express various forms of access policies flexibly. Part of the decryption operations is outsourced to fog nodes, so as to reduce the computing burden of the client. To enhance the credibility of outsourced fog nodes, the correctness of the ciphertext accessed by fog nodes is verified through blockchain transactions, and the access behaviors cannot be denied. Through security and experimental analysis, it is proved that the scheme can resist selective plaintext attack and has high operation efficiency.

Key words: attribute-based encryption, fog computing, outsourced decryption, blockchain