Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation

被引:4
|
作者
Deng, Shijie [1 ]
Yang, Gaobo [1 ]
Dong, Wen [1 ]
Xia, Ming [1 ]
机构
[1] Hunan Univ, Sch Informat Sci & Elect Engn, Changsha 410082, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Cloud computing; Attribute-based encryption; Verifiable ciphertext delegation; Flexible revocation; Access control; IDENTITY-BASED ENCRYPTION; DECRYPTION; SECURE;
D O I
10.1007/s11042-022-13537-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is a promising approach to enables fine-grained access control for encrypted data in cloud storage. However, to design a flexible and effective revocation mechanism has always been a tricky problem for ABE, especially for the situations where revocation occurs frequently. In this work, we propose a practical attribute-based access control scheme by introducing ciphertext-policy attribute-based encryption (CP-ABE) that allows the trusted authority (TA) to efficiently manage the credentials of data users. The problem of revocation is solved efficiently by exploiting user binary tree. To achieve flexible revocation, our scheme supports both attribute revocation and user revocation to accommodate different revocation needs. Non-revoked users can still decrypt the ciphertext as long as his/her remaining attributes satisfy the access policy associated with the ciphertext. Moreover, verifiable ciphertext delegation is presented to reduce the heavy computation cost brought by frequent revocation. The merits of the proposed scheme are proved by comparing its performance and security with the related works.
引用
收藏
页码:22251 / 22274
页数:24
相关论文
共 50 条
  • [41] Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage
    Wang, Shangping
    Guo, Keke
    Zhang, Yaling
    [J]. PLOS ONE, 2018, 13 (09):
  • [42] A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption
    Malluhi, Qutaibah M.
    Shikfa, Abdullatif
    Viet Cuong Trinh
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 230 - 240
  • [43] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [44] Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
    Ibraimi, Luan
    Petkovic, Milan
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 309 - +
  • [45] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    [J]. INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [46] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    [J]. BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [47] Online/offline ciphertext-policy attribute-based searchable encryption
    Chen, Dongdong
    Cao, Zhenfu
    Dong, Xiaolei
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2365 - 2375
  • [48] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu, Jinxia
    He, Xu
    Yan, Xixi
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [49] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27
  • [50] Novel Constructions for Ciphertext-Policy Attribute-Based Searchable Encryption
    Brigitthe Hinojosa-Cabello, Melissa
    Morales-Sandoval, Miguel
    Marin-Castro, Heidy M.
    [J]. 2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,