信息安全研究 ›› 2023, Vol. 9 ›› Issue (7): 667-.

• 数据合规高效流通使用专题 • 上一篇    下一篇

一种支持细粒度授权的数据安全共享方案

陈曦1李勇2李如先1   

  1. 1(联易融数字科技集团有限公司广东深圳518063) 
    2(北京交通大学电子信息工程学院北京100044)
  • 出版日期:2023-07-01 发布日期:2023-07-01
  • 通讯作者: 陈曦 博士.主要研究方向为隐私计算、密码协议应用、区块链、密文共享与授权. chenxi@linklogis.com
  • 作者简介:陈曦 博士.主要研究方向为隐私计算、密码协议应用、区块链、密文共享与授权. chenxi@linklogis.com 李勇 博士,副教授.主要研究方向为应用密码学、云计算安全、隐私计算. liyong@bjtu.edu.cn 李如先 主要研究方向为隐私计算、区块链、大数据、图像OCR. liruxian@linklogis.com

A Secure Data Sharing Scheme Supporting Finegrained Authorization

  • Online:2023-07-01 Published:2023-07-01

摘要: 针对在云计算环境下数据共享时存在的数据集中存储、数据共享困难等问题,通过结合多条件代理重加密和基于属性代理重加密,提出面向多用户的支持多授权条件的基于属性代理重加密方案.该方案支持多个关键词授权条件下的密文数据细粒度访问,能够对密文共享的授权条件和授权范围进行限定,只有属性集符合密文中的访问结构以及关键词与密文所设的关键词一致时,用户才能访问数据.该方案还支持灵活的用户撤销,防止密文未经授权被合谋解密,保护了数据所有者的敏感信息.通过可证明安全分析,在一般群模型下,该方案具有选择明文攻击安全性;与其他条件代理重加密方案相比,其所支持的功能更具有多样性.

关键词: 数据安全流通, 密文共享, 基于属性代理重加密, 多授权条件, 条件代理重加密

Abstract: Considering the problems such as centralized data storage and difficulty in data sharing in cloud computing environments, based on the combination of multiconditional proxy reencryption and attributebased proxy reencryption, a multiconditional attributebased threshold proxy reencryption scheme which supports multiple authorization conditions is proposed. The scheme supports finegrained access to ciphertext data under multiple keyword authorization conditions, and can limit the authorization conditions and scope of ciphertext sharing. Only when the attribute set meets the access structure in the ciphertext and the keywords are consistent with the keywords set in the ciphertext, users can access the data. This solution achieves finegrained access to ciphertext data under multiple keyword authorization conditions, supports flexible user revocation, prevents unauthorized decryption of ciphertext by conspirators, and protects the sensitive information of data owners. Through the provable security analysis, it is shown that under the general group model, the scheme can resist chosen plaintext attack; compared with other conditional proxy reencryption schemes, the functions it supports are more diverse.


Key words: secure data circulation, ciphertext sharing, attributebased proxy reencryption, multiple authorization conditions, conditional proxy reencryption