Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation

被引:4
|
作者
Deng, Shijie [1 ]
Yang, Gaobo [1 ]
Dong, Wen [1 ]
Xia, Ming [1 ]
机构
[1] Hunan Univ, Sch Informat Sci & Elect Engn, Changsha 410082, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Cloud computing; Attribute-based encryption; Verifiable ciphertext delegation; Flexible revocation; Access control; IDENTITY-BASED ENCRYPTION; DECRYPTION; SECURE;
D O I
10.1007/s11042-022-13537-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is a promising approach to enables fine-grained access control for encrypted data in cloud storage. However, to design a flexible and effective revocation mechanism has always been a tricky problem for ABE, especially for the situations where revocation occurs frequently. In this work, we propose a practical attribute-based access control scheme by introducing ciphertext-policy attribute-based encryption (CP-ABE) that allows the trusted authority (TA) to efficiently manage the credentials of data users. The problem of revocation is solved efficiently by exploiting user binary tree. To achieve flexible revocation, our scheme supports both attribute revocation and user revocation to accommodate different revocation needs. Non-revoked users can still decrypt the ciphertext as long as his/her remaining attributes satisfy the access policy associated with the ciphertext. Moreover, verifiable ciphertext delegation is presented to reduce the heavy computation cost brought by frequent revocation. The merits of the proposed scheme are proved by comparing its performance and security with the related works.
引用
收藏
页码:22251 / 22274
页数:24
相关论文
共 50 条
  • [31] A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update
    Liu, Zhe
    Wang, Fuqun
    Chen, Kefei
    Tang, Fei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [32] Research on Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage
    Wang, Guangbo
    Wang, Jianhua
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [33] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    XU Peng
    TANG Yong
    JIANG Wenbin
    JIN Hai
    ZOU Deqing
    [J]. Chinese Journal of Electronics, 2014, 23 (04) : 655 - 660
  • [34] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    Xu Peng
    Tang Yong
    Jiang Wenbin
    Jin Hai
    Zou Deqing
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 655 - 660
  • [35] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Nouha Oualha
    Maryline Laurent
    [J]. World Wide Web, 2018, 21 : 169 - 183
  • [36] Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
    Shi, Yanfeng
    Zheng, Qingji
    Liu, Jigiang
    Han, Zhen
    [J]. INFORMATION SCIENCES, 2015, 295 : 221 - 231
  • [37] Modified Ciphertext-Policy Attribute-Based Encryption Scheme with Efficient Revocation for PHR System
    Zheng, Hongying
    Wu, Jieming
    Wang, Bo
    Chen, Jianyong
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [38] Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud
    Li, Qi
    Zhu, Hongbo
    Ying, Zuobin
    Zhang, Tao
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [39] Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption
    Du, Jiajie
    HelIl, Nurmamat
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (09): : 3274 - 3297
  • [40] Large Universe Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage
    Lian, Huijie
    Wang, Qingxian
    Wang, Guangbo
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (01) : 107 - 117