Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating

被引:0
|
作者
Zuobin YING [1 ]
Hui LI [1 ]
Jianfeng MA [1 ]
Junwei ZHANG [1 ]
Jiangtao CUI [1 ]
机构
[1] School of Computer Science and Technology, Xidian University
基金
中国国家自然科学基金;
关键词
attribute-based encryption; ciphertext-policy; dynamic policy updating; adaptive secure; standard model;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Attribute-Based Encryption(ABE) is a promising new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud. With the help of ABE, the majority of security issues in accessing cloud data can be solved. However, a key limitation remains, namely policy updating.Whenever the access policy is updated, a common approach is to have the data owner retrieve the data and reencrypt it with new policy, before sending the new ciphertext back to the cloud. This straight-forward approach will lead to heavy computation and communication overhead. Although a number of other approaches have been proposed in this regard, they suffer from two limitations; namely, supporting only limited update-policy types or having weak security models. In order to address these limitations, we propose a novel solution to the attribute-based encryption access control system by introducing a dynamic policy-updating technique which we call DPU-CP-ABE. The scheme is proved to be adaptively secure under the standard model and can support any type of policy updating. In addition, our scheme can significantly reduce the computation and communication costs of updating ciphertext.
引用
收藏
页码:187 / 202
页数:16
相关论文
共 50 条
  • [31] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    [J]. BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [32] Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    [J]. Computer Systems Science and Engineering, 2023, 46 (01): : 1079 - 1092
  • [33] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27
  • [34] Novel Constructions for Ciphertext-Policy Attribute-Based Searchable Encryption
    Brigitthe Hinojosa-Cabello, Melissa
    Morales-Sandoval, Miguel
    Marin-Castro, Heidy M.
    [J]. 2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,
  • [35] Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4157 - 4176
  • [36] Toward Secure Data Storage in Web 3.0: Ciphertext-Policy Attribute-Based Encryption
    Gong, Bei
    Guo, Chong
    Liu, Yi-Jing
    Wang, Qian
    [J]. IEEE NETWORK, 2023, 37 (06): : 42 - 49
  • [37] Security analysis for a ciphertext-policy attribute-based encryption scheme
    Zeng, Fugeng
    Xu, Chunxiang
    Zhang, Xinpeng
    [J]. Advances in Information Sciences and Service Sciences, 2012, 4 (12): : 201 - 207
  • [38] Efficient ciphertext-policy attribute-based encryption with blackbox traceability
    Xu, Shengmin
    Yuan, Jiaming
    Xu, Guowen
    Li, Yingjiu
    Liu, Ximeng
    Zhang, Yinghui
    Ying, Zuobin
    [J]. INFORMATION SCIENCES, 2020, 538 : 19 - 38
  • [39] An Efficient Ciphertext-policy Attribute-based Encryption on Ideal Lattices
    Zhao Jian
    Gao Haiying
    Hu Bin
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (07) : 1652 - 1660
  • [40] Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Feng, Xinyu
    Li, Cong
    Li, Dan
    Fang, Yuejian
    Shen, Qingni
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 192 - 204