Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing

被引:52
|
作者
Teng, Wei [1 ,2 ]
Yang, Geng [3 ]
Xiang, Yang [4 ]
Zhang, Ting [1 ]
Wang, Dongyang [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Telecommun & Informat Engn, Nanjing 210023, Jiangsu, Peoples R China
[2] Jiangsu Univ Sci & Technol, Coll Comp Sci Engn, Zhenjiang 212003, Peoples R China
[3] Nanjing Univ Posts Telecommun, Grad Sch, Nanjing 210046, Jiangsu, Peoples R China
[4] Deakin Univ, Sch Informat Technol, Network Secur & Comp Lab, 221 Burwood Highway, Burwood, Vic 3125, Australia
基金
中国国家自然科学基金;
关键词
Access control; cipertext-policy attribute-based encryption; constant ciphertext length; ENCRYPTION;
D O I
10.1109/TCC.2015.2440247
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of cloud computing, there have been increasing concerns about its security and privacy. Since the cloud computing environment is distributed and untrusted, data owners have to encrypt outsourced data to enforce confidentiality. Therefore, how to achieve practicable access control of encrypted data in an untrusted environment is an urgent issue that needs to be solved. Attribute-based encryption (ABE) is a promising scheme suitable for access control in cloud storage systems. This paper proposes a hierarchical attribute-based access control scheme with constant-size ciphertext. The scheme is efficient because the length of ciphertext and the number of bilinear pairing evaluations to a constant are fixed. Its computation cost in encryption and decryption algorithms is low. Moreover, the hierarchical authorization structure of our scheme reduces the burden and risk of a single authority scenario. We prove the scheme is of CCA2 security under the decisional q-Bilinear Diffie-Hellman Exponent assumption. In addition, we implement our scheme and analyse its performance. The analysis results show the proposed scheme is efficient, scalable, and fine-grained in dealing with access control for outsourced data in cloud computing.
引用
收藏
页码:617 / 627
页数:11
相关论文
共 50 条
  • [1] Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing
    CHEN Yanli
    SONG Lingling
    YANG Geng
    [J]. 中国通信., 2016, 13 (02) - 162
  • [2] Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing
    Chen Yanli
    Song Lingling
    Yang Geng
    [J]. CHINA COMMUNICATIONS, 2016, 13 (02) : 146 - 162
  • [3] Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing
    CHEN Yanli
    SONG Lingling
    YANG Geng
    [J]. China Communications, 2016, 13 (02) : 146 - 162
  • [4] Expressive attribute-based keyword search with constant-size ciphertext
    Han, Jinguang
    Yang, Ye
    Liu, Joseph K.
    Li, Jiguo
    Liang, Kaitai
    Shen, Jian
    [J]. SOFT COMPUTING, 2018, 22 (15) : 5163 - 5177
  • [5] Expressive attribute-based keyword search with constant-size ciphertext
    Jinguang Han
    Ye Yang
    Joseph K. Liu
    Jiguo Li
    Kaitai Liang
    Jian Shen
    [J]. Soft Computing, 2018, 22 : 5163 - 5177
  • [6] Direct Revocable Ciphertext Policy Attribute-Based Encryption Scheme with Constant-Size Ciphertext
    Zhu, Guo-Bin
    Xie, Xin
    Zhang, Xing
    Zhao, Yang
    Xiong, Hu
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2021, 50 (01): : 76 - 83
  • [7] Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost
    Chen, Cheng
    Zhang, Zhenfeng
    Feng, Dengguo
    [J]. PROVABLE SECURITY, 2011, 6980 : 84 - 101
  • [8] Efficient Multi-Authority Attribute-Based Signcryption with Constant-Size Ciphertext
    Zhao, Yang
    Ruan, Ankang
    Dan, Guohang
    Huang, Jicheng
    Ding, Yi
    [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [9] Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Zhang, Yinghui
    Zheng, Dong
    Chen, Xiaofeng
    Li, Jin
    Li, Hui
    [J]. PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 259 - 273
  • [10] Expressive Attribute Based Signcryption with Constant-Size Ciphertext
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 398 - 419