Secure access privilege delegation using attribute-based encryption

被引:0
|
作者
Panda, Suryakanta [1 ]
Mondal, Samrat [1 ]
Das, Ashok Kumar [2 ]
Susilo, Willy [3 ]
机构
[1] Indian Inst Technol Patna, Dept Comp Sci & Engn, Bihta, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad, India
[3] Univ Wollongong, Inst Cybersecur & Cryptol, Wollongong, Australia
关键词
Attribute-based encryption; Proxy re-encryption; Cryptographic access control; Secure access delegation; PROXY RE-ENCRYPTION; SCHEME;
D O I
10.1007/s10207-023-00690-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is widely used for a secure and efficient data sharing. The predetermined access policy of ABE shares the data with intended data users. However, ABE is not preferable in many applications that require collaboration among data users. In such applications, an authorized data user may be interested to collaborate with another data user who does not adhere to the access policy. Fixed access policy of ABE does not allow an authorized data user (who satisfies the access policy) to collaborate or share the data with any unauthorized data user (who fails to satisfy the access policy). Thus, due to the static and predefined access policy, data collaboration in ABE is significantly challenging. In this work, we attempt to address this important issue of ABE through proxy re-encryption mechanism. We have formally proved the security of our proposed system. Moreover, we have demonstrated that the proposed system permits revocation of delegation rights.
引用
收藏
页码:1261 / 1276
页数:16
相关论文
共 50 条
  • [31] Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption
    Fan, Kai
    Huang, Nana
    Wang, Yue
    Li, Hui
    Yang, Yintang
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 111 - 114
  • [32] Secure DRM Scheme Supporting Dynamic Authorization Using Attribute-Based Encryption
    Fu Jingyi
    Ma Zhaofeng
    Huang Qinlong
    Yang Yixian
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 287 - 296
  • [33] Developing a Secure Architecture for Internet of Medical Things Using Attribute-Based Encryption
    Ghanbarafjeh, Milad
    Barati, Masoud
    Rana, Omer
    Ranjan, Rajiv
    [J]. 2022 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING, UCC, 2022, : 157 - 162
  • [34] On the Feasibility of Attribute-Based Encryption for WLAN Access Control
    Pisa, Claudio
    Dargahi, Tooska
    Caponi, Alberto
    Bianchi, Giuseppe
    Blefari-Melazzi, Nicola
    [J]. 2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2017, : 783 - 790
  • [35] A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure
    Rifki, Sadikin
    Park, YoungHo
    Moon, SangJae
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (01) : 247 - 265
  • [36] Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
    Lewko, Allison
    Okamoto, Tatsuaki
    Sahai, Amit
    Takashima, Katsuyuki
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 62 - +
  • [37] Secure Access Control for eHealth Data in Emergency Rescue Case based on Traceable Attribute-Based Encryption
    Shen, Yuan
    Song, Wei
    Zhao, Changsheng
    Peng, Zhiyong
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 201 - 208
  • [38] Generic Constructions for Fully Secure Revocable Attribute-Based Encryption
    Yamada, Kotoko
    Attrapadung, Nuttapong
    Emura, Keita
    Hanaoka, Goichiro
    Tanaka, Keisuke
    [J]. COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 532 - 551
  • [39] Generic Constructions for Fully Secure Revocable Attribute-Based Encryption
    Yamada, Kotoko
    Attrapadung, Nuttapong
    Emura, Keita
    Hanaoka, Goichiro
    Tanaka, Keisuke
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1456 - 1472
  • [40] Fully Secure Online/Offline Predicate and Attribute-Based Encryption
    Datta, Pratish
    Dutta, Ratna
    Mukhopadhyay, Sourav
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 331 - 345