Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating

被引:74
|
作者
Liu, Zechao [1 ]
Jiang, Zoe L. [1 ]
Wang, Xuan [1 ]
Yiu, S. M. [2 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Attribute-based encryption; Outsourcing decryption; Attribute revocation; Policy updating; Large universe; Multiple authorities; DATA ACCESS-CONTROL; CLOUD; SECURE; SYSTEMS;
D O I
10.1016/j.jnca.2018.01.016
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-Based Encryption (ABE) offers fine-grained access control policy over encrypted data, and thus applicable in cloud storage to provide authorized data privacy. However, there are some issues that should be solved before deploying ABE in practice. Firstly, as the heavy decryption cost grows with the complexity of access policy, an ABE with outsourcing decryption is preferred to relieve user's computation cost. Secondly, when user's attributes are altered, it is required for ABE supporting attribute revocation to change user's access privilege timely and effectively. Thirdly, in the case of access control policy changed by data owner, policy updating requirement must be met in designing ABE. Therefore, a practical ABE scheme is proposed which can solve aforementioned issues simultaneously. In order to support flexible number of attributes, our scheme also achieves large universe and multiple attribute authorities. The security and performance of the proposed scheme are discussed, followed by extensive experiments to demonstrate its effectiveness and practicability.
引用
收藏
页码:112 / 123
页数:12
相关论文
共 50 条
  • [1] Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing
    School of Mathematics and Statistics, Xidian Univ., Xi'an
    710071, China
    [J]. Xi'an Dianzi Keji Daxue Xuebao, 6 (6-10 and 55):
  • [2] Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage
    Liu, Hongwei
    Zhu, Ping
    Chen, Zehong
    Zhang, Peng
    Jiang, Zoe L.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 556 - 561
  • [3] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao, Jiaxin
    Sun, Jiameng
    Qin, Jing
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
  • [4] Attribute-Based Online/Offline Encryption with Outsourcing Decryption
    Wang, Zhan-Jun
    Ma, Hai-Ying
    Wang, Jin-Hua
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (06) : 1595 - 1611
  • [5] A Partial Outsourcing Decryption of Attribute-Based Encryption for Internet of Things
    Kumar, Dilip
    Kumar, Manoj
    [J]. PROCEEDINGS OF ACADEMIA-INDUSTRY CONSORTIUM FOR DATA SCIENCE (AICDS 2020), 2022, 1411 : 271 - 281
  • [6] Attribute-Based Encryption with Fast Decryption
    Hohenberger, Susan
    Waters, Brent
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 162 - 179
  • [7] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    [J]. SENSORS, 2019, 19 (07)
  • [8] Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation
    Wu Qiuxin
    Zhang Miao
    [J]. CHINA COMMUNICATIONS, 2012, 9 (09) : 22 - 40
  • [9] Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating
    Naruse, Takeru
    Mohri, Masami
    Shiraishi, Yoshiaki
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2015, 5
  • [10] Efficient Attribute-Based Encryption Outsourcing Scheme With User and Attribute Revocation for Fog-Enabled IoT
    Li, Ling
    Wang, Zheng
    Li, Na
    [J]. IEEE ACCESS, 2020, 8 (08): : 176738 - 176749