New Cryptography Primitive Research: Process Based Encryption
Author:
Affiliation:

Clc Number:

Fund Project:

Humanities and Social Science Research Project of Ministry of Education (15YJCZH029); The Project of “the 13th Five-Year Plan” for the Development of Philosophy and Social Sciences in Guangzhou (2016GZYB25, 2017GZQN05); National Natural Science Foundation of China (61772147, 61300204); Guangdong Province Natural Science Foundation of Major Basic Research and Cultivation Project (2015A030308016); Natural Science Foundation of Guangdong Province of China (2015A030313630); Basic Research Project of Guangdong Provincial Department of Education (2014KZDXM044); Colleges and Universities Innovation Team Construction Project Guangdong Province (2015KCXTD014); National Cryptography Development Fund (MMJJ20170117); Guangzhou City Bureau of Cooperative Innovation Project (1201610005); Information Security Comprehensive Management Technology Research Key Laboratory Open Topic Fund of Shanghai (AGK2015007); Guangdong Science and Technology Plan (2016A020210103, 2017A020208054)

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    In many applications, when a user needs to access sensitive information, it is a usual requirement to authenticate whether or not the user satisfies certain processes.Existing encryption schemes are not applicable for this scenario.To adderess this problem, a new cryptography primitive called process pased encryption (PBE) is presented.The application scenario of PBE is demonstrated.PBE is classified into two categories: Key policy process based encryption (KP-PBE) and ciphertext policy process based encryption (CP-PBE).A KP-PBE scheme is constructed utilizing the tools of bilinear map and linear secret sharing scheme (LSSS).Compared to conventional attribute based Eecryption (ABE), the performance of KP-PBE is much better on describing processes.Finally, the security of KP-PBE is proven under the selective security model.

    Reference
    Related
    Cited by
Get Citation

邓宇乔,唐春明,宋歌,温雅敏.一种新的密码学原语研究——流程加密.软件学报,2017,28(10):2722-2736

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:May 22,2016
  • Revised:August 18,2016
  • Adopted:
  • Online: September 30,2017
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063