A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy

被引:1
|
作者
Qi, Fang [1 ]
Li, Ke [1 ]
Tang, Zhe [1 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Multi-authority; Attribute-Based Encryption; Attribute Hierarchy; Attribute-path;
D O I
10.1109/ISPA/IUCC.2017.00097
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The existing attribute based encryption with attribute hierarchy program has only one authority, which causes serious performance bottlenecks. In order to solve the problem in hierarchical attribute based encryption, we proposes a multi-authority hierarchical attribute based encryption scheme. The scheme removes the trusted central authority, and prevents the communication between authorities, thereby ensuring the users' privacy and improving the system performance. We require that all the attributes in the system construct the attribute trees, and any attribute is represented by the attribute trees and the attribute path, which ensure that the users and ciphertexts attributes quickly matching. A user must have satisfactory attributes in order to decrypt. Additionally, we propose a more reasonable way of dividing attribute trees by using hierarchical clustering algorithm. Finally, we give out the correctness analysis and performance comparison analysis of the scheme. It meets the security of IND-sAtr-CPA based on the DBDH assumption in the standard model.
引用
收藏
页码:607 / 613
页数:7
相关论文
共 50 条
  • [1] Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud
    Kang, Li
    Zhang, Leyou
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 3 - 18
  • [2] New Multi-authority Attribute-based Encryption Scheme on Lattices
    Yan Xixi
    Liu Yuan
    Li Zichen
    Tang Yongli
    Ye Qing
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (04) : 811 - 817
  • [3] Multi-Authority Attribute-Based Encryption Scheme from Lattices
    Zhang, Guoyan
    Qin, Jing
    Qazi, Shams
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 483 - 501
  • [4] A Multi-authority Attribute-based Encryption Scheme with Pre-decryption
    Chen, Danwei
    Wan, Liangqing
    Wang, Chen
    Pan, Su
    Ji, Yuting
    [J]. 2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 223 - 228
  • [5] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    [J]. 2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [6] Multi-authority attribute-based identification scheme
    Tang, Fei
    Bao, Jiali
    Huang, Yonghong
    Huang, Dong
    Wang, Huili
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 220 - 228
  • [7] A survey on multi-authority and decentralized attribute-based encryption
    Prince Silas Kwesi Oberko
    Victor-Hillary Kofi Setornyo Obeng
    Hu Xiong
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 515 - 533
  • [8] A survey on multi-authority and decentralized attribute-based encryption
    Oberko, Prince Silas Kwesi
    Obeng, Victor-Hillary Kofi Setornyo
    Xiong, Hu
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 515 - 533
  • [9] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    [J]. DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [10] Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices
    Liu, Yuan
    Wang, Licheng
    Li, Lixiang
    Yan, Xixi
    [J]. IEEE ACCESS, 2019, 7 : 3665 - 3674