Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation

被引:4
|
作者
Deng, Shijie [1 ]
Yang, Gaobo [1 ]
Dong, Wen [1 ]
Xia, Ming [1 ]
机构
[1] Hunan Univ, Sch Informat Sci & Elect Engn, Changsha 410082, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Cloud computing; Attribute-based encryption; Verifiable ciphertext delegation; Flexible revocation; Access control; IDENTITY-BASED ENCRYPTION; DECRYPTION; SECURE;
D O I
10.1007/s11042-022-13537-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is a promising approach to enables fine-grained access control for encrypted data in cloud storage. However, to design a flexible and effective revocation mechanism has always been a tricky problem for ABE, especially for the situations where revocation occurs frequently. In this work, we propose a practical attribute-based access control scheme by introducing ciphertext-policy attribute-based encryption (CP-ABE) that allows the trusted authority (TA) to efficiently manage the credentials of data users. The problem of revocation is solved efficiently by exploiting user binary tree. To achieve flexible revocation, our scheme supports both attribute revocation and user revocation to accommodate different revocation needs. Non-revoked users can still decrypt the ciphertext as long as his/her remaining attributes satisfy the access policy associated with the ciphertext. Moreover, verifiable ciphertext delegation is presented to reduce the heavy computation cost brought by frequent revocation. The merits of the proposed scheme are proved by comparing its performance and security with the related works.
引用
收藏
页码:22251 / 22274
页数:24
相关论文
共 50 条
  • [21] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Cheng, Yong
    Wang, Zhi-ying
    Ma, Jun
    Wu, Jiang-jiang
    Mei, Song-zhu
    Ren, Jiang-chun
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (02): : 85 - 97
  • [22] Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 477 - 494
  • [23] Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing
    Zhao, Zhiyuan
    Wang, Jianhua
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (06): : 3254 - 3272
  • [24] Server Aided Ciphertext-Policy Attribute-Based Encryption
    Wang, Hao
    Yang, Bo
    Wang, Yilei
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 440 - 444
  • [25] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong Cheng
    Zhi-ying Wang
    Jun Ma
    Jiang-jiang Wu
    Song-zhu Mei
    Jiang-chun Ren
    [J]. Journal of Zhejiang University SCIENCE C, 2013, 14 : 85 - 97
  • [26] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong CHENG
    Zhi-ying WANG
    Jun MA
    Jiang-jiang WU
    Song-zhu MEI
    Jiang-chun REN
    [J]. JournalofZhejiangUniversity-ScienceC(Computers&Electronics)., 2013, 14 (02) - 97
  • [27] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Oualha, Nouha
    Laurent, Maryline
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 169 - 183
  • [28] GPU Acceleration of Ciphertext-Policy Attribute-Based Encryption
    Fan, Kai
    Zhang, Chaoyu
    Shan, Ruiwen
    Yu, Hexuan
    Jiang, Hai
    [J]. 2019 20TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2019, : 94 - 101
  • [29] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme
    Zheng, Hua
    Zhang, Xi
    Yang, Qi
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 400 - 411
  • [30] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +