Accountable and Revocable Large Universe Decentralized Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT

被引:11
|
作者
Huang, Kaiqing [1 ,2 ]
机构
[1] Dongguan Polytech, Modern Ind Innovat Practice Ctr, Dongguan 523808, Peoples R China
[2] South China Normal Univ, Sch Math Sci, Guangzhou 510631, Peoples R China
关键词
Encryption; Access control; Internet of Things; Outsourcing; Licenses; Cloud computing; Technological innovation; Decentralized; multi-authority attribute-based encryption; accountability; user-attribute revocation; outsourcing decryption; collusion attack; DATA ACCESS-CONTROL; TRACEABLE CP-ABE; EFFICIENT; INTERNET; STORAGE; THINGS; REVOCATION;
D O I
10.1109/ACCESS.2021.3110824
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The data collected, stored, shared, and accessed across different platforms in the dynamic IoT is mostly confidential and privacy-sensitive. Data security and access control issues urgently need to be addressed. Multi-authority attribute-based encryption (MA-ABE) is seen as a potential solution for addressing data access control security concerns in the dynamic IoT since it allows for dynamic access control over encrypted data. However, the existing key abuse problem is severely destroying the security access control of MA-ABE. The existing accountable attribute-based encryption schemes only support small attributes (users) universe and single authority. Moreover, they do not support revocation. Some schemes are inefficient since they are constructed in the composite order bilinear group. In this article, the author proposes the first accountable and revocable large universe decentralized multi-authority attribute-based encryption scheme with outsourcing decryption based on prime order bilinear groups. The proposed scheme allows for the dynamic capacity expansion of attributes, users, and authorities. An audit mechanism is given to judge if the suspicious key was leaked by a malicious user or by authorities and to determine the identity of the leaker. The malicious user who divulges key can be punished by user-attribute revocation. The revocation mechanism is resistant to collusion attacks undertaken by revoked users and non-revoked users. Meanwhile, it satisfies the requirements of forward and backward security. The proposed scheme is static security in the random oracle model under the q-DPBDHE2 assumption. To save resources, the outsourced decryption module is optional for users with restricted resources. According to the results of the performance analysis, it is suited for large-scale cross-domain cooperation in the dynamic cloud-aided IoT.
引用
收藏
页码:123786 / 123804
页数:19
相关论文
共 50 条
  • [11] Revocable Decentralized Multi-Authority Functional Encryption
    Tsuchida, Hikaru
    Nishide, Takashi
    Okamoto, Eiji
    Kim, Kwangjo
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 248 - 265
  • [12] Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded
    Datta, Pratish
    Pal, Tapas
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT I, 2023, 13940 : 587 - 621
  • [13] Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
    Rouselakis, Yannis
    Waters, Brent
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8975 : 315 - 332
  • [14] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [15] Revocable and Decentralized Attribute-Based Encryption
    Cui, Hui
    Deng, Robert H.
    COMPUTER JOURNAL, 2016, 59 (08): : 1220 - 1235
  • [16] A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy
    Qi, Fang
    Li, Ke
    Tang, Zhe
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 607 - 613
  • [17] Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption
    Tseng, Yi-Fan
    Yang, Hao-Yu
    Wu, Chieh-Han
    Chien, Tsung-Yu
    Tso, Raylin
    Liu, Zi-Yuan
    Hsu, Jen-Chieh
    2022 17TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS, 2022, : 29 - 32
  • [18] Verifiable and auditable multi-authority attribute-based encryption
    Wang, Xingwang
    Zeng, Peng
    Luo, Jiaying
    COMPUTER STANDARDS & INTERFACES, 2025, 94
  • [19] Multi-authority Decentralized Attribute-Based Authorization Framework
    Sok, Kimheng
    Colin, Jean Noel
    Po, Kimtho
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS (CAISE 2022), 2022, 451 : 18 - 30
  • [20] Multi-authority attribute-based encryption with efficient revocation
    Zhang K.
    Ma J.-F.
    Li H.
    Zhang J.-W.
    Zhang T.
    Tongxin Xuebao/Journal on Communications, 2017, 38 (03): : 83 - 91