A Predicate Encryption Scheme with Adaptively Secure

来源 :第十二届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:livan_s
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  The inner product encry ption scheme can achieve fine-grained access control on ciphertext.For the problem that the existing inner product encry ption scheme has poor security and low decry ption efficiency,this paper proposes an inner product encry ption scheme with adaptively secure based on the dual sy stem encry ption method.The scheme is based on bilinear mapping on prime order groups.In the secret key generation algorithm of the scheme,we propose a sharing technique of random vectors and generate a secret key for each component of the attribute vector; and an encry ption algorithm with a constant size ciphertext is designed.Under the k-Lin assumption,the method of the experimental sequence is used to prove that the scheme is adap-tively secure.The decry ption algorithm of the scheme requires only six bilinear pairs.Compared with the existing schemes,the decry ption efficiency has been greatly improved.
其他文献
  本报告以目前最流行的无人驾驶为例,阐述图形 学在人工智能中的应用及地位,报告从无人驾驶的 关鍵三部分-感知、决策及控制-讲述了计算机图形 学在此可以发挥的关键作用,而V
会议
  The security of SPECK under impossible differential cryptanalysis is studied.Based on multiple 6-round impossible differential distinguishers and combined w
  基于位置的数据服务在为用户提供生活便利的同时,不可信第三方无边界地采集个人位置、轨迹模式等信息,进行位置行为关联等分析行为存在着巨大的隐私泄露风险。针对位置数据
  Although the medical monitoring system has massive users,each of them only possesses one piece of data logging that participates in statistical computing.If
  We present an automatic algorithm for subtractive manufacturing of free form 3D objects using high-speed CNC machining.
会议
  目前,僵尸网络检测方法大多依靠对僵尸网络通信活动或通信内容的分析,前者对数据流的特征 进行统计分析,不涉及数据流中的内容,在检测加密类型方面具有较强优势,但准确性较低;
  Variety of security issues exist while all-optical networks provide high-speed transmission,therefore effective means and strategies are needed to repair fa
  As the foundation component of cloud computing platform,the virtual machine(VM)is confronted with numerous security threats.However,existing solutions tend
  高效的计算机可视化系统能够模拟人类的视觉感知系统,在可视化结果中凸显数据蕴含的重要信息和模式,从而帮助人们快速完成数据的认知过程。目前我们已经有了很多优秀的可视
会议
  高维数据可视化与可视分析旨在探索未知数据,发现潜在模式,在数据驱动的科学发现和应用领域探索中发挥着越来越重要的作用。但高维数据可视化面临着高维和未知复杂结构等挑
会议