Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme

被引:0
|
作者
Asim, Muhammad [1 ]
Ibraimi, Luan [2 ]
Petkovic, Milan [1 ,3 ]
机构
[1] Philips Res Eindhoven, Eindhoven, Netherlands
[2] Univ Twente, Fac EWI, NL-7500 AE Enschede, Netherlands
[3] Eindhoven Univ Technol, Fac Math & Comp Sci, NL-5600 MB Eindhoven, Netherlands
来源
关键词
Attribute-Based Encryption; Revocation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we design a new attribute-based encryption scheme with the revocation capability. In the proposed schemes, the user (broadcaster) encrypts the data according to an access policy over the set of attributes, and a list of the identities of revoked users. Only recipients who have attributes which satisfy the access policy and whose identity is not in the list of revoked users will be able to decrypt the message. The proposed scheme can be used for revocation of up to t users. The complexity of proposed schemes is dependent on the number of revoked users r, rather than on the total number 71 of users in the system. The security of the scheme has been proved under the Decisional Bilinear Diffie-Hellman (DBDH) assumption.
引用
收藏
页码:244 / +
页数:2
相关论文
共 50 条
  • [1] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme
    Zheng, Hua
    Zhang, Xi
    Yang, Qi
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 400 - 411
  • [2] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +
  • [3] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [4] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu J.
    He X.
    Yan X.
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [5] Security analysis for a ciphertext-policy attribute-based encryption scheme
    Zeng, Fugeng
    Xu, Chunxiang
    Zhang, Xinpeng
    [J]. Advances in Information Sciences and Service Sciences, 2012, 4 (12): : 201 - 207
  • [6] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update
    Wang, Changji
    Yuan, Yuan
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 1031 - 1041
  • [7] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185
  • [8] Traceable-then-revocable ciphertext-policy attribute-based encryption scheme
    Liu, Zhenhua
    Duan, Shuhong
    Zhou, Peilin
    Wang, Baocang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 903 - 913
  • [9] Privacy preserving ciphertext-policy attribute-based broadcast encryption in smart city
    Cui Yilei
    Zhang Leyou
    [J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26 (01) : 21 - 31
  • [10] On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
    Zhou, Zhibin
    Huang, Dijiang
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 753 - 755