Multi-authority attribute-based encryption with efficient revocation

被引:0
|
作者
Zhang K. [1 ]
Ma J.-F. [2 ]
Li H. [2 ]
Zhang J.-W. [2 ]
Zhang T. [3 ]
机构
[1] School of Telecommunications Engineering, Xidian University, Xi'an
[2] School of Cyber Engineering, Xidian University, Xi'an
[3] School of Computer Science and Technology, Xidian University, Xi'an
来源
Tongxin Xuebao/Journal on Communications | 2017年 / 38卷 / 03期
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; Large universe; Multi-authority; Revocation;
D O I
10.11959/j.issn.1000-436x.2017068
中图分类号
学科分类号
摘要
Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment. However, efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from practical applications. A multi-authority ciphertext-policy attribute-based encryption scheme with efficient revocation was proposed in prime order bilinear groups, and was further proved statically secure and revocable in the random oracle model. Extensive efficiency analysis results indicate that the proposed scheme significantly reduce the computation cost for the users. In addition, the proposed scheme supports large universe and any monotone access structures, which makes it more flexible for practical applications. © 2017, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:83 / 91
页数:8
相关论文
共 18 条
  • [1] Sahai A., Waters B., Fuzzy identity-based encryption, EUROCRYPT, pp. 457-473, (2005)
  • [2] Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine-grained access control of encrypted data, The 13th ACM Conference on Computer and Communications Security, pp. 89-98, (2006)
  • [3] Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, The IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
  • [4] Chase M., Multi-authority attribute based encryption, TCC, pp. 515-534, (2007)
  • [5] Yang K., Jia X., Expressive, efficient and revocable data access control for multi-authority cloud storage, IEEE Transactions on Parallel and Distributed Systems, 25, 7, pp. 1735-1744, (2014)
  • [6] Huang X., Tao Q., Qin B., Et al., Multi-authority attribute based encryption scheme with revocation, The 24th International Conference on Computer Communication and Networks, pp. 1-5, (2015)
  • [7] Cui H., Deng R.H., Revocable and decentralized attribute-based encryption, The Computer Journal, (2016)
  • [8] Waters B., Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, PKC, pp. 53-70, (2011)
  • [9] Lewko A., Waters B., Unbounded HIBE and attribute-based encryption, EUROCRYPT, pp. 547-567, (2011)
  • [10] Rouselakis Y., Waters B., Efficient statically-secure large-universe multi-authority attribute-based encryption, Financial Cryptography and Data Security, pp. 315-332, (2015)