Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme

被引:0
|
作者
Asim, Muhammad [1 ]
Ibraimi, Luan [2 ]
Petkovic, Milan [1 ,3 ]
机构
[1] Philips Res Eindhoven, Eindhoven, Netherlands
[2] Univ Twente, Fac EWI, NL-7500 AE Enschede, Netherlands
[3] Eindhoven Univ Technol, Fac Math & Comp Sci, NL-5600 MB Eindhoven, Netherlands
来源
关键词
Attribute-Based Encryption; Revocation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we design a new attribute-based encryption scheme with the revocation capability. In the proposed schemes, the user (broadcaster) encrypts the data according to an access policy over the set of attributes, and a list of the identities of revoked users. Only recipients who have attributes which satisfy the access policy and whose identity is not in the list of revoked users will be able to decrypt the message. The proposed scheme can be used for revocation of up to t users. The complexity of proposed schemes is dependent on the number of revoked users r, rather than on the total number 71 of users in the system. The security of the scheme has been proved under the Decisional Bilinear Diffie-Hellman (DBDH) assumption.
引用
收藏
页码:244 / +
页数:2
相关论文
共 50 条
  • [31] Ciphertext-policy weighted attribute based encryption scheme
    Liu, Ximeng
    Ma, Jianfeng
    Xiong, Jinbo
    Li, Qi
    Zhang, Tao
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2013, 47 (08): : 44 - 48
  • [32] A Regulation Scheme Based on the Ciphertext-Policy Hierarchical Attribute-Based Encryption in Bitcoin System
    Wang, Yuxiao
    Gao, Juntao
    IEEE ACCESS, 2018, 6 : 16267 - 16278
  • [33] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [34] Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
    Ibraimi, Luan
    Petkovic, Milan
    Nikova, Svetla
    Hartel, Pieter
    Jonker, Willem
    INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 309 - +
  • [35] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27
  • [36] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [37] Online/offline ciphertext-policy attribute-based searchable encryption
    Chen D.
    Cao Z.
    Dong X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2365 - 2375
  • [38] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme in Power Cloud Access Control
    Li, Yuancheng
    Zhang, Pan
    Wang, Boyan
    APPLIED SCIENCES-BASEL, 2018, 8 (10):
  • [39] Novel Constructions for Ciphertext-Policy Attribute-Based Searchable Encryption
    Brigitthe Hinojosa-Cabello, Melissa
    Morales-Sandoval, Miguel
    Marin-Castro, Heidy M.
    2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,
  • [40] Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation
    Ghopur, Dilxat
    Ma, Jianfeng
    Ma, Xindi
    Miao, Yinbin
    Hao, Jialu
    Jiang, Tao
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (07)