Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation

被引:0
|
作者
Gao J. [1 ]
Sun J. [1 ]
Qin J. [1 ]
机构
[1] School of Mathematics, Shandong University, Jinan
基金
中国国家自然科学基金;
关键词
Attribute revocation; Attribute-based encryption (ABE); Cloud storage; Outsourcing computation; Verifiability;
D O I
10.7544/issn1000-1239.2019.20190323
中图分类号
学科分类号
摘要
Attribute-based encryption (ABE) is a new type of public key encryption method that can implement fine-grained access control on data in cloud servers, but the computational overhead of key distribution, data encryption and data decryption processes in attribute-based encryption is too expensive, which causes a large computational burden on the user with limited computing resources. In order to solve this problem, this paper constructs an attribute-based encryption scheme which supports key attribute revocation, outsource key distribution and data decryption work to the cloud server, at the same time, the proposed scheme can verify the correctness of outsourcing computation by using Hash functions; the scheme uses online/offline encryption and transfers lots of computation to the offline, which can effectively protect the privacy of user data, reduce the amount of user computing, and promote the operation efficiency of the solution; in addition, we use the tree access policy to provide more fine-grained access control; and the method of re-encryption realizes fine-grained attribute revocation, revoking a single attribute indirectly by generating a re-encryption key to update attributes and ciphertext; Finally, the user identity is embedded into the key to achieve the user traceability property. The proposed scheme is proved to be indistinguishable against chosen-plaintext attack(IND-CPA) security under the standard model. © 2019, Science Press. All right reserved.
引用
收藏
页码:2160 / 2169
页数:9
相关论文
共 26 条
  • [1] Feng D., Zhang M., Zhang Y., Et al., Study on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
  • [2] Park J., Sandhu R.S., Towards usage control models: Beyond traditional access control, Proc of the 7th ACM Symp on Access Control Models and Technologies, pp. 52-61, (2002)
  • [3] Sahai A., Waters B., Fuzzy identity-based encryption, Proc of Annual Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 57-64, (2005)
  • [4] Green M., Hohenberger S., Waters S., Outsourcing the decryption of ABE ciphertexts, Proc of the 20th USENIX Conf on Security, (2011)
  • [5] Zhou Z., Huang D., Efficient and secure data storage operations for mobile cloud computing, Proc of the 8th Int Conf on Network and Service Management, pp. 37-45, (2012)
  • [6] Li J., Huang X., Li J., Et al., Securely outsourcing attribute-based encryption with checkability, IEEE Transactions on Parallel and Distributed Systems, 8, 25, pp. 2201-2210, (2014)
  • [7] Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine-grained access control of encrypted data, Proc of the 13th ACM Conf on Computer and Communications Security, pp. 89-98, (2006)
  • [8] Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, Proc of the 28th IEEE Symp on Security and Privacy, pp. 321-324, (2007)
  • [9] Yu S., Wang C., Ren K., Et al., Attribute based data sharing with attribute revocation, Proc of the 5th ACM Symp on Information, Computer and Communications Security (ASIACCS'10), pp. 261-270, (2010)
  • [10] Hohenberger S., Waters B., Online/offline attribute-based encryption, Proc of PublicKey Cryptography (PKC 2014), pp. 293-310, (2014)