OBLIVIOUS TRANSFER WITH ACCESS CONTROL AND IDENTITY-BASED ENCRYPTION WITH ANONYMOUS KEY ISSUING

来源 :Journal of Electronics(China) | 被引量 : 0次 | 上传用户:roy1984
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In ACM’CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption(IBE) with Anonymous Key Issuing(AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow. In ACM ’CCS 2009, Camenisch, et al. Proposed the Oblivious Transfer with Access Control (AC-OT) in which each item is associated with an attribute set and can only be available, on request, to the users who have all the attributes in the associated set. Namely, AC-OT achieves access control policy for conjunction of attributes.Essentially, the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV: for each item, one attribute is associated with it, and it is requested that only that users who possess the associated attribute can obtain the item by queries.On one hand, AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand, any AC-OT can be realized by an AC-OT-SV.In this paper, we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch , et al. From the protocol, interestingly, a concrete Identity-Based Encryption (IBE) with Anonymous Key Issuing (AKI) is given whic h is just a direct application to AC-OT-SV.By comparison, we show that the AKI protocol we present is more efficient in communications than that proposed by Chow.
其他文献
l.第一组I2C总线从微处理器ICl213的輦輶訛、輷訛輦脚输出,通过串行数据线SDA1和串行时钟线SCLl,与ICl211存储器进行数据存、取交换;对被控电路IC601、IC3001进行调整和控制
本文针对分程控制一般有四种控制方法,而在一种特殊条件要求下很难实现的状况下,论述了一种通过智能阀门定位器实现特殊控制要求的方法.
研究了胶束毛细管电动色谱法同时分离祖师麻中紫丁香苷(SR)、7-甲氧基香豆素(7-MC)、瑞香苷(DN)、瑞香素(DP)和7-羟基香豆素(7-HC)等五种成分的主要影响因素,通过分离条件的
本文介绍了两套甲醇控制系统的组成、所用各种模块的性能、特点,所用上位、下位软件的组态、操作以及两套控制系统的合并方法.介绍了两套甲醇控制系统合并在河南省世纪金源化
本文以PCS7系统在港库区的应用为实例,从港库区储运系统的工艺出发,在分析其控制要求的基础上,系统介绍PCS7的系统结构、网络构成和硬件配置;重点描述了PCS7系统的软件和硬件
本文介绍了压缩机的喘振现象,TS3000防喘振控制系统的主要功能和特点,对性能控制和防喘振控制之间的解耦做了重点介绍.
本文介绍了塔河油田3号联合站控制系统.塔河油田3号联合站控制系统由过程控制系统(PCS),火气监控系统(F&G)组成.PCS系统通过工业以太网与操作站连接,将全站所有的检测点信号
会议
本文简要介绍了洛阳石化总厂的5万吨/年特种油装置的仪表控制系统的应用,讨论了建设与调试中仪表控制系统存在的问题及其改进.
B特早辣椒是由河南早羊角椒经多代单株自交育成的自交A03和上海引进的甜椒上海茄门经6季单株选育而成的C11配制的一代杂种,2003年3月通过全国农作 B special early peppers
本文首先介绍了压缩机控制要求,然后探讨了天然气压缩机、循环气压缩机控制系统硬件及软件设计方案和实现.并根据系统实际运行情况,提出改进方案,加以完善.