Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption

被引:2
|
作者
Bkakria, Anis [1 ]
机构
[1] IRT SystemX, Palaiseau, France
关键词
ABE; Threshold Cryptography; Adaptive Security; ABE;
D O I
10.1007/978-3-031-10684-2_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute based encryption (ABE) is a cryptographic technique allowing fine-grained access control by enabling one-to-many encryption. Existing ABE constructions suffer from at least one of the following limitations. First, single point of failure on security meaning that, once an authority is compromised, an adversary can either easily break the confidentiality of the encrypted data or effortlessly prevent legitimate users from accessing data; second, the lack of user and/or attribute revocation mechanism achieving forward secrecy; third, a heavy computation workload is placed on data user; last but not least, the lack of adaptive security in standard models. In this paper, we propose the first single-point-of-failure free multi-authority ciphertext-policy ABE that simultaneously (1) ensures robustness for both decryption key issuing and access revocation while achieving forward secrecy; (2) enables outsourced decryption to reduce the decryption overhead for data users that have limited computational resources; and (3) achieves adaptive (full) security in standard models. The provided theoretical complexity comparison shows that our construction introduces linear storage and computation overheads that occurs only once during its setup phase, which we believe to be a reasonable price to pay to achieve all previous features.
引用
收藏
页码:197 / 214
页数:18
相关论文
共 50 条
  • [1] Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption
    Zuo, Cong
    Shao, Jun
    Wei, Guiyi
    Xie, Mande
    Ji, Min
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 495 - 508
  • [2] Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption
    Bkakria, Anis
    [J]. JOURNAL OF COMPUTER SECURITY, 2023, 31 (06) : 727 - 760
  • [3] Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation
    Wu Qiuxin
    Zhang Miao
    [J]. CHINA COMMUNICATIONS, 2012, 9 (09) : 22 - 40
  • [4] Attribute-based encryption with outsourced decryption in blockchain
    Hui Zheng
    Jun Shao
    Guiyi Wei
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 1643 - 1655
  • [5] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [6] Attribute-based encryption with outsourced decryption in blockchain
    Zheng, Hui
    Shao, Jun
    Wei, Guiyi
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1643 - 1655
  • [7] Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage
    Liu, Hongwei
    Zhu, Ping
    Chen, Zehong
    Zhang, Peng
    Jiang, Zoe L.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 556 - 561
  • [8] Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption
    Zheng, Hui
    Shao, Jun
    Wei, Guiyi
    Hue, Li
    Pan, Bianjing
    Liu, Kai
    Mao, Xiaohang
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 552 - 566
  • [9] Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
    Qin, Baodong
    Deng, Robert H.
    Liu, Shengli
    Ma, Siqi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1384 - 1393
  • [10] Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lin, Suqing
    Zhang, Rui
    Ma, Hui
    Wang, Mingsheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2119 - 2130