Towards Attribute Revocation in Key-Policy Attribute Based Encryption

被引:0
|
作者
Wang, Pengpian [1 ]
Feng, Dengguo [1 ]
Zhang, Liwu [1 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing, Peoples R China
来源
关键词
Attribute Revocation; Attribute Based Encryption; Key-Policy; Access Structure; Access Tree; BROADCAST;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute revocation is important to the attribute-based encryption (ABE). The existing A BE schemes supporting revocation mainly focus on the revocation of the user's identity; which could only revoke the user's whole attributes by revoking the user's identity. In some cases, we wish to revoke one attribute of a user instead of the whole attributes issued to him without affecting any other user's private key, such that the user still can use his private key to decrypt as long as the unrevoked attributes of him satisfy the decryption condition. In this paper, we propose two KP-ABE schemes realizing the attribute revocation under the direct revocation model.
引用
收藏
页码:272 / 291
页数:20
相关论文
共 50 条
  • [1] Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation
    Ghopur, Dilxat
    Ma, Jianfeng
    Ma, Xindi
    Hao, Jialu
    Jiang, Tao
    Wang, Xiangyu
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 3999 - 4011
  • [2] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [3] Hierarchical Authority Key-Policy Attribute-Based Encryption
    You, Lin
    Wang, Lijun
    [J]. 2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 868 - 872
  • [4] Efficient key-policy attribute-based encryption scheme
    Xu, Zhiqin
    Zhang, Leyou
    [J]. ICIC Express Letters, 2015, 9 (01): : 31 - 35
  • [5] Large universe decentralized key-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 501 - 509
  • [6] Key-Policy Multi-authority Attribute-Based Encryption
    Longo, Riccardo
    Marcolla, Chiara
    Sala, Massimiliano
    [J]. ALGEBRAIC INFORMATICS (CAI 2015), 2015, 9270 : 152 - 164
  • [7] Adaptable key-policy attribute-based encryption with time interval
    Siqi Ma
    Junzuo Lai
    Robert H. Deng
    Xuhua Ding
    [J]. Soft Computing, 2017, 21 : 6191 - 6200
  • [8] Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test
    Liao, Yongjian
    Chen, Hongjie
    Li, Fagen
    Jiang, Shaoquan
    Zhou, Shijie
    Mohammed, Ramadan
    [J]. IEEE ACCESS, 2018, 6 : 10189 - 10196
  • [9] Key-policy attribute-based encryption scheme for general circuits
    Hu P.
    Gao H.-Y.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2016, 27 (06): : 1498 - 1510
  • [10] Key-Policy Attribute-Based Encryption from Bilinear Maps
    Tiplea, Ferucio Laurentiu
    Dragan, Constantin Catalin
    Nica, Anca-Maria
    [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 28 - 42