基于国密算法的智能电网数据CP-ABE方案研究与实现
作者:
作者单位:

1.国网四川省电力公司技能培训中心;2.重庆大学

中图分类号:

TP391


Ciphertext-Policy Attribute-Based Encryption scheme for smart grid data based on Chinese national cryptography
Author:
Affiliation:

1.State Grid Sichuan Electric Power Company Skills Training Center;2.School of Bigdata and Software Engineering,Chongqing University

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [20]
  • | |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    智能电网是结合双向通信技术融合各种电力设备的新型电力系统框架,智能电网中的业务数据包含敏感和私人信息,需要直接在数据层面实施细粒度的访问控制。本文提出了一种基于国密算法的智能电网数据密文策略属性基加密(CP-ABE)方案,通过在SM9-IBE算法的系统主密钥、系统公钥和用户私钥中增加了属性相关的组件,并在密文中引入了阈值树形式的访问结构,将SM9-IBE算法扩展为支持细粒度访问控制的CP-ABE算法,进而加密SM4分组密码算法密钥。只有符合访问策略的用户才能解密并获取对称密钥,而且方案能够抵抗合谋攻击。

    Abstract:

    Smart grid is a new power system framework that combines bidirectional communication technology and various electrical devices. The business data in the smart grid contains sensitive and private information, and thus fine-grained access control needs to be directly implemented at the data level. This paper proposes a Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme for smart grid data based on Chinese national cryptography. By adding attribute related components to the system master key, system public key, and user secret key of the SM9-IBE algorithm, and introducing an access structure in the form of threshold tree to the ciphertext, the SM9-IBE algorithm is extended to support fine-grained access control in the CP-ABE scheme, which thereby encrypts the SM4 block cipher key. Only users who comply with the access policy can decrypt and obtain this symmetric key. Moreover, the scheme can resist collusion attacks.

    参考文献
    [1] Pandey R K, Misra M. Cyber security threats—Smart grid infrastructure[C]//2016 National power systems conference (NPSC). IEEE, 2016: 1-6.
    [2] Chin W L, Li W, Chen H H. Energy big data security threats in IoT-based smart grid communications[J]. IEEE Communications Magazine, 2017, 55(10): 70-75.
    [3] Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM conference on Computer and communications security. 2006: 89-98.
    [4] Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]//2007 IEEE symposium on security and privacy (SP''07). IEEE, 2007: 321-334.
    [5] Sahai A, Waters B. Fuzzy identity-based encryption[C]//Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24. Springer Berlin Heidelberg, 2005: 457-473.
    [6] 张强,刘雪艳,王维洲,等.基于CP-ABE的智能电网访问控制研究[J].计算机工程,2014,40(12):83-88.Zhang Qiang, Liu Xueyan, Wang Weizhou, et al. Research on Access Control in Smart Grid Based on CP-ABE[J]. Computer Engineering,2014,40(12):83-8
    [7] 赵东东,石乐义,谢云飞.基于CP-ABE的工业控制系统加密传输方案[J].计算机技术与发展,2022,32(10):94-99.ZHAO Dong-dong,SHI Le-yi,XIE Yun-fei. Encrypted Transmission Scheme of Industrial Control System Based on CP-ABE[J]. Computer Technology and Development,2022,32(10):94-99.
    [8] 张海俊,丁平刚,彭一轩,等.基于CKKS与CP-ABE的国网电力数据共享方案[J].信息安全研究,2023,9(03):262-270.Zhang Haijun, Ding Pinggang, Peng Yixuan, et al. State Grid Electricity Data Sharing Scheme Based on CKKS and CP-ABE[J]. Journal of Information Security Research,2023,9(03):262-270.
    [9] 祁嘉琪,莫欣岳,周永恒,等.基于国密算法SM2和CP-ABE的医疗访问控制系统的设计与实现[J].网络安全与数据治理,2023,42(07):37-42+48.DOI:10.19358/j.issn.2097-1788.2023.07.006.Qi Jiaqi, Mo Xinyue, Zhou Yongheng, et al. Design and implementation of medical data access control system based on SM2 and CP-ABE[J]. Network and Information Security,2023,42(07):37-42+48.DOI:10.19358/j.issn.2097-1788.2023.07.006.
    [10] 张彦杰,王辉,李延,等.电力物联网下基于SM9的CP-ABE访问控制方案[J/OL].太原理工大学学报,1-14[2024-07-10].http://kns.cnki.net/kcms/detail/14.1220.N.20240229.1750.007.html.ZHANG Yan-jie, WANG Hui, LI Yan, et al. SM9-based CP-ABE access control scheme under Power IoT[J/OL]. Journal of Taiyuan University of Technology,1-14[2024-07-10].http://kns.cnki.net/kcms/detail/14.1220.N.20240229.1750.007.html.
    [11] 国家密码管理局. SM9 标识密码算法: GM/T 0044-2016[S]. 北京: 中国标准出版社, 2016.National Cryptography Administration. SM9 identity-based cryptographic algorithms: GM/T 0044-2016[S]. Beijing: Standards Press of China,2016.
    [12] Shi Y, Ma Z, Qin R, et al. Implementation of an attribute-based encryption scheme based on SM9[J]. Applied Sciences, 2019, 9(15): 3074.
    [13] Ji H, Zhang H, Shao L, et al. An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud[J]. Connection Science, 2021, 33(4): 1094-1115.
    [14] Delgado-Gomes V, Martins J F, Lima C, et al. Smart grid security issues[C]//2015 9th International conference on compatibility and power electronics (CPE). IEEE, 2015: 534-538.
    [15] De Caro A, Iovino V. jPBC: Java pairing based cryptography[C]//2011 IEEE symposium on computers and communications (ISCC). IEEE, 2011: 850-855.
    [16] Shamir A. Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology: Proceedings of CRYPTO 84 4. Springer Berlin Heidelberg, 1985: 47-53
    [17] Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Annual international cryptology conference. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001: 213-229.
    [18] 张星,沈晴霓,吴中海.属性加密研究综述[C]//中国科协组织人事部.第十一届全国博士生学术年会——信息技术与安全专题论文集.北京大学信息科学技术学院;北京大学软件与微电子学院;北京大学国家工程研究中心;,2013:8.Xing Zhang, Qingni Shen, Zhonghai Wu. A Survey on Attribute-based Encryption[C]. The 11th National Doctoral Academic Annual Conference - Collection of Papers on Information Technology and Security,2013:8.
    [19] 彭建新,杨小辉.属性加密及其应用综述[J].中国人民公安大学学报(自然科学版),2015,21(04):38-41.Peng Jianxin, Yang Xiaohui. Overview of Attribute Encryption and Its Applications[J]. Journal of People''s Public Security University of China (Science and Technology),2015,21(04):38-41.
    [20] 王生玉,汪金苗,董清风,等.基于属性加密技术研究综述[J].信息网络安全,2019,(09):76-80. WANG Shengyu, WANG Jinmiao, DONG Qingfeng, et al. A Survey of Attribute-based Encryption Technology[J]. Netinfo Security, 2019, 19(9): 76-80.
    相似文献
    引证文献
    引证文献 [0] 您输入的地址无效!
    没有找到您想要的资源,您输入的路径无效!

    网友评论
    网友评论
    分享到微博
    发 布
引用本文
分享
文章指标
  • 点击次数:124
  • 下载次数: 0
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2024-08-07
  • 最后修改日期:2024-10-25
  • 录用日期:2024-10-25
文章二维码